Abstract
Internet of Things-based environments collect and generate huge amounts of data about users, their activities, and their surroundings, which can disclose some sensitive information and threaten their privacy. Hence, the user’s collected and handled data by IoT-based applications need to be exploited and secured in an appropriate way to protect personal data and user’s privacy. Therefore, we aim at improving the data ownership, transparency, and auditability for users. To this end, we propose an end-to-end privacy-preserving framework for the IoT data using blockchain technology. The smart contract use in our framework will hence enforce the privacy requirement compliance according to the user’s (i.e., data owner) privacy preferences and end-user’s (i.e., data consumer) requests. To do so, we detail the design of the system architecture by introducing its core components and functionalities and highlight through an example of how it operates in a real-world use-case.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bertino, E.: Data security and privacy in the IoT. In: EDBT, vol. 2016, pp. 1–3 (2016)
Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1392–1393. IEEE (2016)
Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White paper (2014)
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292–2303 (2016)
Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 173–178. ACM (2017)
Ethereum project’s Solidity Team: Solidity language (2016). http://solidity.readthedocs.io/en/develop/. Accessed 10 Aug 2018
Hashemi, S.H., Faghri, F., Rausch, P., Campbell, R.H.: World of empowered IoT users. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 13–24. IEEE (2016)
International Organization for Standardization: Information technology security techniques privacy framework, ISO/IEC 29100 (2011)
Landman, D.: Arduino Library for AES Encryption (2017). https://github.com/DavyLandman/AESLib. Accessed 10 Aug 2018
Maddox, T.: The dark side of wearables: how they’re secretly jeopardizing your security and privacy (2015). https://www.techrepublic.com/article/the-dark-side-of-wearables-how-theyre-secretly-jeopardizing-your-security-and-privacy/. Accessed 10 Aug 2018
MyEtherWallet Team: Myetherwallet (2015). https://www.myetherwallet.com/. Accessed 10 Aug 2018
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: Fairaccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology (2005)
Regulation, General Data Protection: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46. Off. J. Eur. Union (OJ) 59, 1–88 (2016)
Singla, A., Mudgerikar, A., Papapanagiotou, I., Yavuz, A.A.: HAA: hardware-accelerated authentication for Internet of Things in mission critical vehicular networks. In: 2015 IEEE Military Communications Conference, MILCOM 2015, pp. 1298–1304. IEEE (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Loukil, F., Ghedira-Guegan, C., Boukadi, K., Benharkat, A.N. (2018). Towards an End-to-End IoT Data Privacy-Preserving Framework Using Blockchain Technology. In: Hacid, H., Cellary, W., Wang, H., Paik, HY., Zhou, R. (eds) Web Information Systems Engineering – WISE 2018. WISE 2018. Lecture Notes in Computer Science(), vol 11233. Springer, Cham. https://doi.org/10.1007/978-3-030-02922-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-02922-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02921-0
Online ISBN: 978-3-030-02922-7
eBook Packages: Computer ScienceComputer Science (R0)