You are on page 1of 20

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/335682781

Blockchain Technology: A Survey on Applications and Security Privacy


Challenges

Article  in  Internet of Things · September 2019


DOI: 10.1016/j.iot.2019.100107

CITATIONS READS

49 6,386

4 authors:

Bhabendu Kumar Mohanta Debasish Jena


Centurion University of Technology and Management International Institute of Information Technology, Bhubaneswar
36 PUBLICATIONS   252 CITATIONS    87 PUBLICATIONS   673 CITATIONS   

SEE PROFILE SEE PROFILE

Soumyashree S Panda Srichandan Sobhanayak


International Institute of Information Technology, Bhubaneswar International Institute of Information Technology, Bhubaneswar
22 PUBLICATIONS   174 CITATIONS    21 PUBLICATIONS   138 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Service allocation in cloud View project

A Remote Device Authentication Scheme for Secure Communication in Cloud Based IOT View project

All content following this page was uploaded by Bhabendu Kumar Mohanta on 12 June 2020.

The user has requested enhancement of the downloaded file.


Internet of Things 8 (2019) 100107

Contents lists available at ScienceDirect

Internet of Things
journal homepage: www.elsevier.com/locate/iot

Review article

Blockchain technology: A survey on applications and security


privacy Challenges
Bhabendu Kumar Mohanta∗, Debasish Jena, Soumyashree S. Panda,
Srichandan Sobhanayak
Department of Computer Science and Engineering, IIIT Bhubaneswar, Odisha 751003 India

a r t i c l e i n f o a b s t r a c t

Article history: Blockchain Technology has received a lot of attention from both industry and academia
Received 25 September 2018 due to its decentralized, persistency, anonymity and auditability properties. In this sur-
Revised 21 August 2019
vey, use of Blockchain technology in wide applications area and its implementation chal-
Accepted 31 August 2019
lenges have been done. A rigorous search for journal/research article related to Blockchain
Available online 07 September 2019
technology have been reviewed. We have considered five databases to conduct this survey
Keywords: namely Sciencedirect, IEEE Xplore, Web of Science, ACM Digital Library and Inderscience
Blockchain are being used. After initial phase elimination 135 research articles are considered in final
Cryptocurrency databases for the survey. Main focus of the survey is to provide a comprehensive analysis
Mining on wide applications of Blockchain technology for the academic research community. In
Smart Contract this paper challenges in implementing of Blockchian and its associated security and pri-
Security vacy issues have been discussed. For the first time a survey of this type have been done
Privacy where Blockchain with application and its associated security and privacy issue have been
reviewed.
© 2019 Elsevier B.V. All rights reserved.

1. Introduction

Blockchain technology is the popular in the recent year because of its decentralized, peer to peer transaction and im-
mutable properties. It is a digital ledger available publicly to all user present in the network. The concept is derived from
Santoshi Nakamoto’s 2008 [1] Bitcoin cryptocurrency. Since then more than 20 0 0 cryptocurrencies are available now in the
market. Though the use of Bitcoin is still not widely available to the world-wide. The different issue like anti-money laun-
dering(AML) [2] legal and illegal mining performance [3] are associated with Bitcoin. In the Bitcoin system mining process
[4–6] and validation of the transaction takes almost 7-8minutes.
This concept is useful to many application areas like healthcare, Internet of Things(IoT), industry, supply chain manage-
ment etc. In this survey, the main focus has been given to analyze the technical implementation of Blockchain in different
application area from the academic point of view as well as some recent development by different organization to apply
Blockchain technique in different fields.
In the modern area, digital information flows one end to another end through an untrusted transmission channel. Here
the privacy and confidentiality is a major concern. Blockchain technology provides a secure peer to peer communication. In


Corresponding author.
E-mail addresses: C116004@iiit-bh.ac.in1 (B.K. Mohanta), debasish@iiit-bh.ac.in2 (D. Jena), C117011@iiit-bh.ac.in3 (S.S. Panda), srichandan@iiit-bh.ac.in4
(S. Sobhanayak).

https://doi.org/10.1016/j.iot.2019.100107
2542-6605/© 2019 Elsevier B.V. All rights reserved.
2 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

Table 1
Comparison of survey works for Blockchain technology

Survey Papers Year Focus Area Security Issue Remarks

Marco Conoscenti [10] 2016 Specific IoT Not Covered Address factors affect integrity, anonymity, and
adaptability of this technology
Xiaoqi Li [11] 2017 Not Mention Covered Made a security survey and identify the real
attack associated with blockchain
Mandrita Banerjee [12] 2017 Specific -IoT Not Covered Address how blockchain help in secret sharing of
IoT data set and identify nine future research
problems
Bayu Adhi Tama [13] 2017 General Study Not Covered A state of art review is done on blockchain
application
Lakshmi Siva Sankar [14] 2017 Not Mention Not Covered Survey made on, different consensus protocol and
their feasibility, efficiency.
Zibin Zheng [15] 2016 Moderate Not Covered Made a review on blockchain taxonomy, related
consensus protocol and explained the
application area.
Iuon-Chang Lin [16] 2017 Not mention Covered Security issue and different challenges are address
Proposed work 2018 Extensive Most Covered We made an extensive survey of, 5 different
area research databases and identify the blockchain
application, categorically explain each article.
Also, identify the potential implementation of
blockchain technology and security issue also
mention

Blockchain technology transaction are publicly available for reading but none can modify the transaction once it is recorded.
Extensive literature survey has been done and it has been found that Blockchain is being used in many useful application ar-
eas. Authors in [7] specify Blockchain is a probabilistic state machine and is not useful where finality of decisions is needed.
Authors in [8,9] explained some of the potential range of Blockchain utility and addresses how Blockchain technology can be
used in different traditional databases problem.The comparison of different survey work done by researcher for Blockchain
technology are mentioned in Table 1.
Currently Blockchain technology is one of the most demanding research fields but it lacks technical details to make a
really implemented in almost every area. The research articles are classified in application wise. This paper also explained
issues related to implementation in different application of Blockchain technology. The main contribution of this paper is as
follows:

• Extensive survey carried out about Blockchain upto 2018.


• In this paper,we conduct first systematic applications area of Blockchain.
• There are 12 applications area considered for the survey.
• It also addressed issues regarding security and privacy.

Rest of the paper organizes as follow. Background of the research is explained in Section 2. Architecture and working
procedure of the Blockchain is described in Section 3. Application wise details analysis presented in Section 4. Security and
privacy issues related to Blockchain technology are discussed in Section 5. Finally,conclusion of survey has been discussed
in Section 6.

2. Research background

Blockchain technology is decentralized and peer to peer communication. It is also publicly available like a digital ledger.
It can be applied to stored data or transaction in a trusted environment without the third party involvement. Initially,
Blockchain keyword is selected to collect the papers from five technical databases that are IEEE Xplore, ScienceDirect, ACM
Digital Library, Web of Science, Inderscience. In the first phase 751 research articles have been considered. We eliminate
526 articles after reading the abstract. Also removed redundant articles. In the second phase, we considered full paper and
again perform some elimination. Finally 153 articles are selected for the survey. Out of 153 articles, total 106 number of
articles are application based and 20 numbers of paper are based on security privacy. These five databases sufficiently cover
Blockchain technology and provide a broad view of existing research. The results of the study would help to identify and
map research areas related to Blockchain technology and possible research gaps.

3. Blockchain architecture

Blockchain is the technology behind Bitcoin. It is a public distributed database which holds the encrypted ledger.
Blockchain is technology in a global database that anyone, anywhere, with an internet connection, can use. Unlike a tra-
ditional database, which is owned by central party like banks and governments, a Blockchain doesnt belong to anyone. With
an entire network looking after it, cheating the system by faking document, transactions and other information become
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 3

Fig. 1. Blockchain architecture.

near impossible. Blockchain store information permanently across a network among nodes. This is not only decentralizing
the information but distributes it too. Each node in the network can store the local copy of the Blockchain system which is
periodically updated to have the consistency among all nodes. A Blockchain is a distributed computation and information
sharing platform which enable multiple nodes that do not trust each other can take decision making process. The problem
in centralized system is single point of failure. In a decentralized system there are multiple coordinate points which over-
come the single point of failure. In a distributed environment every node collectively executes the job. In Fig. 1 shown basic
architecture of Blockchain. Each user represented as node connected in a distributed way. Every node maintained a copy
of the Blockchain list which is regularly updated. A node can perform different activity like initiate a transaction,validate a
transaction or perform mining.

3.1. Structure of the Blockchain technology

• Block:
In Blockchain, block is the collection of valid transactions. In a Blockchain system any node can start a transaction and
broadcast to all nodes present in the network. Network nodes validate the transaction using the old transactions, once
transaction is validated next step is add to the existing Blockchain. How many transactions occurred with respect to
that time frame are grouped as part of the block and then stored into the Blockchain block. In Bitcoin ”A block may
contain more than 500 transactions on average, the average size of a block is around 1 MB (an upper bound proposed by
Satoshi Nakamoto in 2010)”. It may grow up to 8 MB or sometime higher (as of March 2018). Larger blocks can help in
processing large number of transactions in one go. The detail of Blockchain system is described in Fig. 2. Each component
of Figure described below.
• Two components: Block Header and List of Transactions

Block header consists of Metadata about a block:

• Previous Block hash:Every block inherits from the previous block.Blockchain system use previous blocks hash to create
the new blocks hash it make the Blockchain tamper proof.
• Mining statistics used to construct the block: The mechanism needs to be complicated enough, to make the Blockchain
tamper proof Bitcoin Mining:
Hk = Hash(Hk−1 |T ||nonce| )
4 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

Fig. 2. Block attributes in a Blockchain system.

Fig. 3. Merkle tree structure diagram.

Current block Hash is calculated applying the Hash of previous block Hash value,Transaction root Hash value T and Nonce
which is obtained by solving the consensus mechanism.
• Merkle Tree Root:The transactions are organized in a Merkle Tree structure. The root of the Merkle tree is a verification
of all the transactions. The Merkle Root in Fig. 3 shown is used to construct the block Hash. If you change a transaction,
you need to change all the subsequent block hash. The difficulty of the mining algorithm determines the toughness of
tampering with a block in a Blockchain.

3.2. Types of Blockchain

Blockchain has three different type present like public, private and consortium as shown in the Fig. 7.

• Public:
Public Blockchain has ledgers visible to everyone on the internet and anyone can verify and add a block of transactions
to the Blockchain [17].
• Private:
Private Blockchains allow only specific people in the organization to verify and add transaction block but everyone on
the internet is generally allowed to view [18].
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 5

Fig. 4. Different types of Blockchain.

Fig. 5. Digital signature apply for user identity.

• Consortium:
Here, only a group of organization (such as banks) can verify and add transaction but the ledger can open or restricted
to select group.

3.3. How does Blockchain is working ?

Blockchian work in a P2P decentralized way. The.hash function, digital signature and public-private keys are used to
validate the transaction after that it is added to the Blockchain of the system. In Figs. 5 and 6 simple working of Blockchain
shown. The hash function is used to connect the block in a Blockchain system in tamper-proof way. Digital signature is used
to identify the user identity so that no one can deny their own activities in the Blockchain network. The purpose of digital
signature is that the node will sign the document and broadcast it along with the transaction. The rest of the nodes in the
network can verify the signature. The private key is used to sign the message where as public key is used to verify the
signature. The digital signature in Blockchain system prevent non-repudiation.
Blockchain may be permissioned [19] based or it may be permissionless [20] architecture. It vary depending upto the
network of the application. Scalability [21] is one of the challenges of Blockchain. Authors in [22,23] described the smart
contract and computation model in a public Blockchain. Blockchain as a software connector helps make explicitly important
architecture considerations on the resulting performance and quality attributes of the system [24]. The work done in [25],
proposed a new system for exact confirmation of transactions in a block. Replacing original signature, a new Interactive
6 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

Fig. 6. The mining process of a Blockchain system.

Fig. 7. Different applications of Internet of Things.

Incontestable Signature (IIS) scheme is used between dealer and owner to confirm a transaction. By this signature, the
dealer can assure the owner that a transaction will be included into blockchain in a non-repudiation way. The scheme is
proved to be secure for owners unforgeability and dealers incontestability. Authors in [26] provides tutorial on Blockchain
idea and functioning. TrustChain [27] is capable of creating trusted transactions among strangers without central control.
This enables new areas of Blockchain use with a focus on building trust between individuals.
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 7

Table 2
Healthcare applications.

References Year Method Contribution

[28] 2017 MedRec and electronic MedRec: blockchain based system provides patients a complete, immutable
medical records (EMRs) log and easy access to their medical information. Leveraging unique
blockchain properties, MedRec manages authentication, condentiality,
accountability and data sharing crucial considerations when handling
sensitive information.
[29] 2016 smart healthcare management Blockchain implementation in healthcare industry is explain here. like smart
system healthcare management system for benet of the patients and to ght
counterfeit drugs in the pharmaceutical industry.
[30] 2016 Pervasive social network (PSN) A secure system for pervasive social network (PSN)-based healthcare. The
proposed method initializes secure links for PSN nodes.
[31] 2017 OmniPHR A model named OmniPHR, a distributed model to integrate PHRs, for
patients and healthcare providers use. this model support a distributed
PHR, where patients health records are maintained using blockchain
technology.
[32] 2016 MeDShare The blockchain-based trust system and provides data provenance, auditing,
and control for shared medical data in cloud repositories among big data
entities. In MeDShare, all transaction are recorded in a tamper-proof
manner.
[33] 2017 Body sensor network According to the features of health blockchain, used a body sensor network
to design a lightweight backup and ecient recovery scheme for keys of
health blockchain.
[34] 2017 IoT To designed an agile, softwarized infrastructure that embraces cloud and fog
computing, blockchain and message brokers for exible, cost-eective, secure,
and private IoT deployment for smart-healthcare applications and services.
[35,36] 2017 Biomedical health care overview of the latest biomedical health care applications of blockchain
technologies also discuss of the potential challenges and proposed
solutions of adopting blockchain technologies in biomedical health care
domains.

4. Application of Blockchain Technology

Initially, the concept of Blockchain technology derives from Bitcoin cryptocurrency, after that this concept is used differ-
ent domains. The following paragraph explaining the applications of Blockchain into financial, healthcare, IoT, legal perspec-
tive, government, power grid, Transport system, commercial world, cloud computing, reputation, E-business, supply chain
have been summarized.

4.1. Healthcare

Healthcare sector where patients, doctors and drugs department need to apply recent development technologies for
better service provides to the end users. Privacy is one of the most important issue need to be address in healthcare sector.
Blockchain characteristic show the way to address the issue arise. Using Blockchain a digital database can be shared among
different user maintaining privacy.

• US Medical Group Launches Blockchain Certification Pilot: A national non-profit group for state medical boards launched
a Blockchain which focused on digital certification. The Federation of State Medical Boards (FSMB) announced is the
latest organization for testing the use of Blockcerts. It is an open source standard which is on the top of the bitcoin
which is introduced by learning machine technology. Verification of medical education very important task and which is
successfully done by Blockchain.
• Nokia Trials Blockchain in Bid to Secure Health Data: For storing healthcare related data NOKIA has announced a new
Blockchain pilot. Around hundred participants took part in this project to test how the data get store and the degree of
privacy around the information. In this project they have used wearable devices to track daily steps, hours of sleep and
stored that data in the Blokchain. Trust is very important in the case of health data to provide benefit to individuals,
families and global society.

Academic research point of view lots of work has been done in healthcare sector using Blockchain, these are described
in the Table 2.

4.2. Financial

The financial application detail is given in Table 3.


8 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

Table 3
Financial application.

Reference Year Methods Contribution

[37] 2016 Mining Various mining techniques used by most of the Cryptocurrencies and
also evaluate the details of each mining process.
[38,39] 2017, 2015 Mining Explain the effort need to build mining processors for increased
performance and reduced the power consumption and purpose a
Goldstrike 1processor that has an energy efficiency of 1 GH/J, it
can be increased greater than 4GH/J.
[40] 2018 CoinParty A novel decentralized mixing service by taking the advantages of
both centralized and decentralized services in a single system.
[41] 2016 Web-based Social Networking Exhibited the fast prototyping of a Framework that is equipped for
intertwining various semi-organized web-based social networking
information streams into a logical picture of a Cryptographic
money commercial center.
[42] 2016 Namecoin Explained the Namecoin digital currency and data Analysis are
perform to predict the future of this digital coin.
[43] 2016 Improved Blockchain The design of a blockchain and address issue such as performance,
security. This new design blockchain optimizes the system with
respect to scalability and privacy.
[44] 2017 Paillier Cryptosystem Proposed a framework to hide the amounts by employing the Paillier
cryptosystem for encryption and decryption. This system achieves
delicate anonymity and prevents active and passive attacks, which
effectively improves the transaction privacy
[45–47] 2015 Financial Domain Blockchain Discussed the blockchain in the financial system.
[48] 2017 Financial Domain Explained the impact of blockchain technology in financial domain
[49,50] 2017 Banking System Suggested the use of blockchain in banking system.
[51,52] 2017 Smart Contracts Explained the verification of smart contracts in crypto currency
system.
[53] 2016 Banking System Discussed how the global banking system benefits from blockchain
technology
[54] 2017 Performance Analysis Proposed a framework, DecReg, based on blockchain technology and
provide the protocols designed for this framework which also
present performance analysis.
[55] 2016 Smart Contract Demonstrated DecentralisedApp(DAPP) for the sharing of everyday
objects based on a smartcontract on the Ethereum blockchain.
[56] 2017 Payment Presents a solution that allows an arbitrary set of users in a payment
channel network to securely rebalance their channels, according to
the preferences of the channel owners.
[57] 2016 Comparison Aims to find out the research gap between blockchain and
cryptocurrency.
[58] 2016 Bitcoin Explains the concept, characteristics, need of Blockchain and how
Bitcoin works.

4.3. Internet of things

Internet of things is a connection of heterogeneous smart devices. The different applications area of IoT is shown in
Fig. 7. The most of the applications architecture are based on centralized system. The centralized system has some issue
like single point failure, trust management, and security issues. The paper [59] explained the trust evaluation consensus
protocol for digital ledger in M2M system using Blockchain. IoT and Blockchain technology integration makes the system
robust and tamper-proof. In [60,61] authors explained the energy-efficient, distributed computing in Body Area Network.
The IoT applications layer-wise details description and security issues along with the challenges are surveyed in [62]. This
survey identified the IoT model, summarized the details thread model. The IoT device authentication was proposed in [63] by
authors, using SRAM-based PUF in zero-knowledge proof to identify the device and put signature in the message in the
Blockchain environment. Authors in paper [64], used the machine learning to optimized the offloading of data in swarm
environment. similarly paper [65,66] explained the digital signature and encryption part along with the IoT business model
for the application. The paper in [67], authors surveyed the IoT application integration with Blockchain technology and
suggested the attack model in IoT devices. The authors in [68], reviewed the IoT in the industry perspective and given the
security requirement details to implement Industrial IoT. This paper [69], explained the consensus protocol to evaluate the
performance of the IoT devices in a distributed environment. The security issue of IoT application can be addressed by the
Blockchain technology was explained in paper [70], by the researcher. The papers [71–74] explained the basic architecture,
model, communication system, security and privacy issues of the IoT applications.
The Tables 4 and 5 summarized the work done by different authors in IoT applications based on Blockchain technology.
There are many projects are going on in IoT by using Blockchain:

• Vehicle-to-vehicle cooperation to marshal traffic:-In this project vehicle will run on the road and simultaneously they
can communicate with each) other so traffic will get reduce. In this project, they are using Cooperative Managed Merge
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 9

Table 4
Internet of things various applications.

References Year Method Contribution

[75,76] 2017 Permission and Multi-layer secure IoT To identies important necessities for longevity, agility, and
network. incremental adoption in IoT based on blockchain.
[77] 2016 IoT model Identify challenges in deployment of Blockchain in IoT like
privacy, security and architecture point and suggested
solution.
[78] 2017 security Blockchain Strengthen the Internet of Things in term of cost
and capacity constraints, deficient architecture and
susceptibility to manipulation it also overcome security
challenges
[79] 2017 DistBlockNet IoT network Proposed architecture integration with Blockchain prevent
different attacks and high performance achieved using flow
rule tables in DistBlockNet.
[80] 2017 PlaTIBART Is a platform for transactive IoT Blockchain applications to
develop, test and analyze fault-tolerant IoT Blockchain
application.
[81] 2016 Multi-level multiple granularity Proposed system data model is enabled with retrieve, update
and Add properties of Blockchain technology. It also
explain the publish subscribe model having join, receive,
updates. Filter and deliver data based on Blockchain system
without single point failure.
[82] 2017 CitySense: sensors data storage CitySense consists of data layer where data are measure,
control and store data using Blockchain. SCRUM
methodology is used to develop software based on
Blockchain because of its capabilities of being a exible,
adaptive and iterative methodology.
[83] 2017 Decentralized access To propose a decentralized access model for IoT data, using a
network architecture that call modular consortium
architecture for IoT and block chains.
[84–86] 2017 peer to peer transaction Digital ledger peer to peer transaction based Blockchain
concept can be overcome the traditional problem in IoT
based application.
[87] 2016 Security for smart city A security framework that integrates the Blockchain
technology with smart devices to provide a secure
communication platform in a smart city.
[88] 2017 security for Smart home Blockchain based smart home system design with respect to
the fundamental security goals of condentiality, integrity,
and availability.

Table 5
Internet of things application.

References Year Method Contribution

[89] 2017 IoT device A way to manage IoT devices using Ethereum, Blockchain computing
platform.
[90] 2017 IoT services To report architectural issues for realizing Blockchain-driven IoT services.
[91] 2017 Challenges in IoT In this article many challenges are describe with respect to Blockchain IoT.
[92] 2017 IoT design A Blockchain-based design for the IoT that brings a distributed access control
and data management.
[93] 2017 security and privacy A lightweight BC-based architecture for IoT that virtually eliminates the over
heads of classic BC, while maintaining most of its security and privacy.
[94] 2017 IoT application The scalability issue in an IoT based application.
[95] 2016 Fog and cloud platform in IoT It evaluates the use of the fog and the cloud as possible platforms in a IoT
application. The performance analysis clearly indicates that the network
latency is the dominant factor.
[96] 2016 Virtual Resources The idea of using restful micro-services called Virtual Resources. A Virtual
Resource is a software-dened IoT management construct that enables
multi-tenancy support and load distribution onto edge hosts and
performance analysis of Virtual Resources in various settings.
[97] 2017 LoRaWAN IoT A Blockchain based solution to build an open, trusted, decentralized and
tamper-prof system for LoRaWAN IoT
[98] 2017 IoT E-business An IoT E-business model, redesign many elements in traditional E-business
models, realize the transaction of smart property and paid data on the IoT
with the help of P2P trade based on the Blockchain and smart contract.
[99] 2017 Secure Firmware A secure rmware update issue, which is a fundamental security challenge for
the embedded devices in an IoT environment.
10 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

Fig. 8. Blockchain based digital right management system.

and Passed (CMMP) system. By this system driving the behavior of the driver is monitored, recorded and evaluated
themselves. In this project, sometime vehicles are referred as consumer vehicles (it can run in higher speed in less
occupied lanes) and sometimes merchant vehicles (it occupies slower lanes of traffic and allow to consumer vehicles to
merge into their lanes).
• Cisco Seeks to Protect Blockchain System for IoT Device Tracking: In this technology they are protecting Blockchain plat-
form by identifying a different connected device, monitoring them and evaluating how trustworthy that device is. This
system also able to automatically access the registered device. The registration process is occurred by comparing the
performance of the network which is already present in the Blockchain.

4.4. Legal perspective

The licensor, users, and mining are used to implement the Blockchain in the digital right management system as shown
in Fig. 8. The Blockchain provides a decentralized platform for digital content distribution. Each d9gital document uploaded
and permission is given by the licensor using the smart contract. The user also have a smart contract to access and play
the digital document from the Blockchain database. Some research already explained the use of Blockchain in digital legal
perspective. Authors in [100] and [101] discuss Blockchain can be a solution for current legal frameworks regulating con-
tracts across jurisdictions to maintain digital ledger without the third party. It also help in preserve the security and privacy
of the common person. The work done in articles [102] and [103] explained that Blockchain architecture in digital right
management system which provides lots of transparency among different stakeholders.

4.5. Government

The use of Blockchain technology in government sector is explained in [104]. Authors discussed the benefits of using
Blockchain technology in e-government such as improvements quality and quantity of services, transparency, and accessi-
bility, information sharing across the different organization in China. The Blockchain is secure against any online attacks,
transactions are publicly available to the users and once a transaction is added to the Blockchain it can’t be modified or
delete which make data transaction safe, secure and open to all. Authors in [105,106] explained Blockchain technology can
be utilized in government sector as it is decentralized, secure, peer to peer, and openly available to all user in the network.

4.6. Power grid

Energy trading [107], solar power system, smart metering [108], microgrid energy [109] these are the power grid sectors
Blockchain technology helps to provide the intelligent service to the end users. A Blockchain consists of small messages
combine with time-stamped blocks, intimated to all the nodes in a network. The public/private key pair may be used by
all the nodes in the network for signing messages and identified by a pseudonym. Each node signs a message before it
broadcast to rest of the nodes in the network. Periodically, mining takes place in a new message and subsequently added
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 11

Fig. 9. Blockchain based power grid architecture.

message is added into the Blockchain. Once a message is added to the block it becomes persistent and non-repudiable.
Authors in [110,111] explained a design of Blockchain based transactive microgrid which can provide transactional integrity
across decentralized computing node. Authors also extended PETra trading workflow. PETra builds on distributed ledgers,
such as Blockchains, and provides anonymity for communication, bidding, and trading. The hybrid Blockchain [112], system
means combine of public and private Blockchain system provides a new facilities to the power grid system. In Fig. 9, it is
shown that architecture of Blockchain in different power grid systems.

4.7. Intelligent transportation systems

ITS consists of seven [113] layers. Each layer has some hardware devices or application services associated with, which
helps in providing intelligent service. When integrating with Blockchain technology it enhances the device security and data
privacy [114]. Fig. 10, showed that Blockchain can provide secured, trusted and decentralized ITS ecosystem. In ITS secure
key management [115] is one of the important issues within the heterogeneous network. Physical layer consists of various
physicals sensors embedded with the vehicle. Data layer consists of chained of blocks and related techniques for encryption
and hashing. In network layer Blockchain based ITS connect the vehicles in P2P model. Various kind of consensus algorithms
is used for the data validation to reach in a mutual trust among peers in consensus layer. Next, some incentive is allocated
as per consensus algorithm and the smart contract is done finally application layer provides intelligent services and smart
management to the system. The authors in paper [116] proposed a model for collaborative information gathering using
public Blockchain. The Proof of Work consensus algorithm was used achieved the system-specific Blockchain.

4.8. Commercial world

Authors in [117,118] explained novel Blockchain architecture for commercial world and mentioned specific policies using
which smart contracts are design. The work proposed in [119], a network medias digital rights management scheme based
on the Blockchain. The proposed scheme can use these functionalities of Blockchain to implement the effective production
management, copyright management, construction industry [120], transaction management and users behavior management
for network media. In Fig. 11, manufacturer, supplier, warehouse, E-retailer and customer participating in a commercial mar-
ket based on Blockchain technology described. Authors in [121,122] papers demonstrated that it is possible to successfully
employ the Blockchain technology to facilitate M2M interactions and establish a M2M electricity market in the context of
the chemical world.
12 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

Fig. 10. Blockchain based ITS architecture.

Fig. 11. A block diagram of energy producers and a consumer participating in an electricity market over a Blockchain.

4.9. Cloud computing

Cloud computing provides storage, processing, services, infrastructure and application. The cloud computing has lots of
advantages in a network. Fig. 12 shows the distributed Blockchain based cloud architecture. Authors in [123] proposed novel
Blockchain-based distributed cloud architecture with a Software Defined Networking (SDN) enable controller fog nodes at
the edge of the network to meet the required design principles. The proposed model is a distributed cloud architecture
based on Blockchain technology, which provides low-cost, secure, and on-demand access to the most competitive computing
infrastructures in an IoT network. By creating a distributed cloud infrastructure, the proposed model enables cost-effective
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 13

Fig. 12. Overview of the distributed Blockchain cloud architecture.

high-performance computing. The provenance architecture ProvChain [124], JointCloud [125] computing are the two papers
explained the Blockchain concept integration with cloud computing environment and suggested that disadvantage of cloud
computing can be overcome by using Blockchain concepts like trust, no central computing and security and privacy of the
end user. Users also shown his transaction in digital ledger form in Blockchain system.

4.10. Reputation system

Traditional Reputation system in a P2P network has many disadvantages like updating data, accuracy, maintained
large file system and dynamic changes in the network. The networks also face attacks like collusion attack, Sybil attack.
Blockchain-based reputation system overcomes the major challenges present in the system. Authors in [126] paper initially
discussed current reputation systems and presents the first generalized reputation system that can be applied to multiple
networks that is based on the Blockchain. The contribution made in [127] paper is a systematic framework for aggregat-
ing online identity and reputation information, to provide a holistic approach to personal online behavioral ratings. Major
contributions include: An identity aggregation mechanism based on social dependency network is proposed, a smart con-
tract management framework referring to personal online ratings based on the aggregated digital identity, an experimental
implementation based on Blockchain technology, with illustrative examples and theoretical evaluations to the proposed ap-
proach.

4.11. E-business

The rapid growth of online shopping leads to the huge growth of E-business in the last few years. Trusted Data Mar-
ketplaces [128] increases the customer interest in E-business model. Research point of view few works has been done in
this application area. Authors in [129] article proposed E-business model, reform many elements in traditional E-business
models and explained the transaction of smart property and paid data on the IoT with the help of Peer to Peer trade based
on the Blockchain and smart contract. Authors in [130] provided Blockchain-based e-commerce solutions for small, medium
and large businesses. The processes used by businesses and entrepreneurs may transfer to Syscoin without the need of the
third party. This paper also address unique features of Syscoin in an architectural framework that enabled high security
through merged-mining and low inflation. It also enabled trust-less payments and services to be used today in commercial
ventures and partnerships as well as provide an investment proposition to holders of Syscoin token holders.
14 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

4.12. Supply chain

Chines government institute launches Blockchain for authentication: The researcher body of China government came up
with the policy of Blockchain-as-a-service for a chasseing supply chain. It purely based on two main objectives: it stores
uniform data and record changes to that uniform data. This new platform used to pursue Blockchain technology faster and
to contribute countries development. Other fields that uses Blockchain-as-a-service is chines e-commerce giant JD, JD.com
to track beef import using Blockchain platform, Walmart used Blockchain for shipping matter. The work done in [131] about
RFID and Blockchain technology in building the Agri-food supply chain traceability system and validate the building process
of this system. It can realize the traceability with trusted information in the entire agri-food supply chain, which would
effectively guarantee the food safety, by gathering, transferring and sharing the authentic data of agri-food in production,
processing, warehousing, distribution and selling links. Authors in article [132] proposed a Blockchain based solution to
address the problems of supply chain such as Double Marginalization and Information Asymmetry. Authors in [133] built
a food supply chain traceability system for real-time food tracing based on HACCP (Hazard Analysis and Critical Control
Points), Blockchain and Internet of Things, which could provide an information platform for all the supply chain members
with openness, transparency, neutrality, reliability, and security.

5. Security and privacy in Blockchain

Blockchain work like a public ledger, however it need to ensure a number of different aspects:

• Protocols for Commitment: Ensure that every valid transaction from the clients are committed and included in the
Blockchain within a finite time.
• Consensus: Ensure that the local copies are consistent and updated.
• Security: The data needs to be tamper proof.Some of the nodes may act maliciously or can be compromised.
• Privacy and Authenticity: The data or transactions belong to various nodes.so the privacy and authenticity needs to be
ensured.

Blockchain concept derived from bitcoin cryptocurrency emerged as an encouraging technology for peer to peer transac-
tion, data integrity, transparent storage in a decentralized environment. The various risk and attack of Blockchain technology
exist in various applications some are Double spending, privacy leakage, private key security, mining attack, balanced attack.
The security and privacy issue of Blockchain is also addressed by the different researcher, in this section some of the aca-
demic work already done are discussed in brief.
The cryptographic primitives [134], privacy and anonymity on the Blockchain are one of the key issue during hashing
the transaction. Different cryptographic algorithm are used during mining process, [135] compared and proposed bitcoin
and Ethereum consensus algorithms. Authors in [136] investigated the merits of using open distributed ledgers (ODLs), for
securing Trust Management for authentication. The data integrity [137] can be realized through a transaction, authentica-
tion of Blockchain properties which reduces the threats and ensure data integrity. Authors in [138] proposed the idea and
model of designated-verifier proof of assets for bitcoin exchange and constructed the first concrete scheme to realize the
designated verifier proof of assets for bitcoin exchange by using elliptic curve cryptography. Public key infrastructure based
framework integration with Cecoin distributed PKI scheme used to enhanced security [139]. Cybersecurity and protecting
privacy [140] is another important issue in Blockchain implementation. The work proposed in [141], a novel trust-based
solution have been proposed to model effective cooperative content uploading in cellular environments based on D2D prox-
imity communications. Some application suffer from various attacks like Double-spend attack [142] and Code-based attacks,
Double spending, Dust transactions [143]. These attacks need to be addressed. The resilience of the Bitcoin ecosystem the
unambiguousness of the Blockchain in use, the propagation and verification of transaction blocks [144]. Authors in [145] pro-
posed a framework existing PoW-based deployments as well as PoW Blockchain variants that are instantiated with different
parameters, and to objectively compare the tradeoffs between their performance and security provisions. Ownership of the
data produced by the network becomes more and more important in times of ever-growing capabilities to collect and ana-
lyze data of individuals. In light of these challenges, authors show Blockchain technology can enable privacy by presenting
an odometer fraud prevention system [146]. The application records mileage and GPS data of cars and secures that on the
Blockchain, which strongly hinders odometer fraud. Online attacks like ransomware [147] are also need to be addressed,
in some application where network architecture deal with internet. The application infrastructure must safe from outside
accessibility otherwise ransomware attack can possible. Another type of attack is Byzantine-fault tolerant [148] ordering ser-
vice for the Hyperledger Fabric Blockchain platform using the BFT-SMaRt replication library address the security and privacy
issue. Authors in [149] identify conditions under which Blockchain systems fail to ensure consensus and present a repro-
ducible execution on Ethereum private chain. Authors in article [150] described the several adversary which can manipulate
smart contract to get advantage. The work in [151] discussed the overview and analyze the security provisions of Bitcoin
and its underlying Blockchain effectively capturing recently reported attacks and threats in the system. The analysis of report
describe and evaluate a number of countermeasures to detect threats on the system some of which have already been in-
corporated in the system. Authors in [152] presented the secure utilization of drones as on-demand nodes for inter-service
operability between multiple vendors by exploiting the features of the Blockchain. The Personal privacy protection issues
has gradually caused widespread concern in society which will lead to economic and reputation losses, hinder network and
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 15

E-commerce innovation or some other consequences if not handled properly. Authors in [153] make used of the decentral-
ization, permanent and audibility of the Blockchain to propose a Blockchain-based personal privacy protection mechanism,
which uses online taxi-hailing as the application scenario.

5.1. Research challenges in Blockchain technology

1. How to design the efficient Blockchain distributed system which can afford scalability of the system ?
2. In a permission based system how to take a mutual decision ignoring malicious nodes ?
3. Mining process which need to be execute in less computation power.
4. Design of smart contract based Blockchain application
5. Distributing task scheduling in the Blockchain network.
6. As the Blockchain grow to large size how to store and verify in efficient way by the each node ?

6. Conclusion

Blockchain is the peer to peer (P2P) decentralized transaction and publicly available digital ledger. Since 2008 bitcoin
and Blockchain are the two most important technologies in information system. Blockchain can be used to numerous ap-
plications to perform a transaction in a trustful environment without the third part. In this survey work,initially explain
research method has been discussed followed by the architecture and working principle of the Blockchain.Next twelve ap-
plications area where Blockchain technology looks promising to solve the existing centralized system in a decentralized way
also several security issues are addressed. Some of the most demanding application areas like the Internet of Things(IoT),
Healthcare etc has been identified. The from the study it was found that some work being done in term of privacy and
security issues but lots of improvement need to be done. Blockchain technology has numerous advantage like decentral-
ized, publicly available transaction, openness, secure. However, there is still some research need to be done like network,
scalability and mining process of Blockchain system.

Declaration of Competing Interest

The authors do not have conflict of interest with any one. I request the Editor to expedite the review process of the
submitted article (“Blockchain Technology: A Survey on Applications and Security Privacy Challenges”).

Acknowledgements

This work is supported by Information Security Education Awareness (ISEA Phase II), Meity, India. This work is one of the
part of the research project under taken by the IIIT Bhubaneswar. The authors would like to thank the Ministry of Electronics
and Information Technology (Meity) India.

References

[1] S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. [Online]. Available: https://bitcoin.org/bitcoin.pdf.
[2] M. Moser, R. Bohme, D. Breuker, An inquiry into money laundering tools in the Bitcoin ecosystem, in: Proceedings of the eCrime Researchers Summit
(eCRS), 2013, IEEE, 2013, pp. 1–14.
[3] J.A. Dev, Bitcoin mining acceleration and performance quantification, in: Proceedings of the 2014 IEEE 27th Canadian Conference on Electrical and
Computer Engineering (CCECE), IEEE, 2014, pp. 1–6.
[4] A. Beikverdi, J. Song, Trend of centralization in Bitcoin’s distributed network, in: Proceedings of the 2015 16th IEEE/ACIS International Conference on
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), IEEE, 2015, pp. 1–6.
[5] G. Di Battista, V. Di Donato, M. Patrignani, M. Pizzonia, V. Roselli, R. Tamassia, Bitconeview: visualization of flows in the Bitcoin transaction graph,
in: Proceedings of the 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), IEEE, 2015, pp. 1–8.
[6] D.A. Wijaya, Extending asset management system functionality in Bitcoin platform, in: Proceedings of the 2016 International Conference on Computer,
Control, Informatics and its Applications (IC3INA), IEEE, 2016, pp. 97–101.
[7] K. Saito, H. Yamada, Whats so different about blockchain?blockchain is a probabilistic state machine, in: Distributed Computing Systems Workshops
(ICDCSW), 2016 IEEE 36th International Conference on, IEEE, 2016, pp. 168–175.
[8] G. Hurlburt, Might the blockchain outlive bitcoin? IT Prof. 18 (2) (2016) 12–16.
[9] M.E. Peck, Blockchain world-do you need a Blockchain? this chart will tell you if the technology can solve your problem, IEEE Spectr. 54 (10) (2017)
38–60.
[10] M. Conoscenti, A. Vetrò, J.C. De Martin, Blockchain for the Internet of Things: A systematic literature review, in: 2016 IEEE/ACS 13th International
Conference of Computer Systems and Applications (AICCSA), IEEE, 2016, pp. 1–6.
[11] X. Li, P. Jiang, T. Chen, X. Luo, Q. Wen, A survey on the security of blockchain systems, Fut. Gen. Comput. Syst. (2017), doi:10.1016/j.future.2017.08.020.
[12] M. Banerjee, J. Lee, K.K.R. Choo, A blockchain future to Internet of Things security: A position paper, Digit. Commun. Netw. (2017) URL: https://
www.sciencedirect.com/science/article/pii/S2352864817302900.
[13] B.A. Tama, B.J. Kweka, Y. Park, K.-H. Rhee, A critical review of blockchain and its current applications, in: Proceedings of the 2017 International
Conference on Electrical Engineering and Computer Science (ICECOS), IEEE, 2017, pp. 109–113.
[14] L.S. Sankar, M. Sindhu, M. Sethumadhavan, Survey of consensus protocols on blockchain applications, in: Proceedings of the 2017 4th International
Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, 2017, pp. 1–5.
[15] Z. Zheng, S. Xie, H.-N. Dai, X. Chen, H. Wang, Blockchain challenges and opportunities: A survey, International Journal of Web and Grid Services 14
(4) (2018) 352–375.
[16] I.-C. Lin, T.-C. Liao, A survey of blockchain security issues and challenges, IJ Netw. Secur. 19 (5) (2017) 653–659.
16 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

[17] L. Xu, N. Shah, L. Chen, N. Diallo, Z. Gao, Y. Lu, W. Shi, Enabling the sharing economy: privacy respecting contract based on public blockchain, in:
Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, ACM, 2017, pp. 15–21.
[18] T.T.A. Dinh, J. Wang, G. Chen, R. Liu, B.C. Ooi, K.-L. Tan, Blockbench: a framework for analyzing private blockchains, in: Proceedings of the 2017 ACM
International Conference on Management of Data, ACM, 2017, pp. 1085–1100.
[19] X. Min, Q. Li, L. Liu, L. Cui, A permissioned blockchain framework for supporting instant transaction and dynamic block size, in: Proceedings of the
2016 IEEE Trustcom/BigDataSE/I SPA, IEEE, 2016, pp. 90–96.
[20] L. Luu, V. Narayanan, C. Zheng, K. Baweja, S. Gilbert, P. Saxena, A secure sharding protocol for open blockchains, in: Proceedings of the 2016 ACM
SIGSAC Conference on Computer and Communications Security, ACM, 2016, pp. 17–30.
[21] R. Dennis, G. Owenson, B. Aziz, A temporal blockchain: a formal analysis, in: Proceedings of the 2016 International Conference on Collaboration
Technologies and Systems (CTS), IEEE, 2016, pp. 430–437.
[22] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, J.J. Kishigami, Blockchain contract: a complete consensus using blockchain, in: Pro-
ceedings of the 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), IEEE, 2015, pp. 577–578.
[23] C.K. Frantz, M. Nowostawski, From institutions to code: towards automated generation of smart contracts, in: Proceedings of the IEEE International
Workshops on Foundations and Applications of Self∗ Systems, IEEE, 2016, pp. 210–215.
[24] X. Xu, C. Pautasso, L. Zhu, V. Gramoli, A. Ponomarev, A.B. Tran, S. Chen, The blockchain as a software connector, in: Proceedings of the 2016 13th
Working IEEE/IFIP Conference on Software Architecture (WICSA), IEEE, 2016, pp. 182–191.
[25] Y. Zhu, R. Guo, G. Gan, W.-T. Tsai, Interactive incontestable signature for transactions confirmation in Bitcoin blockchain, in: Proceedings of the 2016
IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), volume 1, IEEE, 2016, pp. 443–448.
[26] N. Bozic, G. Pujolle, S. Secci, A tutorial on blockchain and applications to secure network control-planes, in: Proceedings of the Smart Cloud Networks
& Systems (SCNS), IEEE, 2016, pp. 1–8.
[27] P. Otte, M. de Vos, J. Pouwelse, TrustChain: A Sybil-resistant scalable blockchain, Fut. Gen. Comput. Syst. (2017), doi:10.1016/j.future.2017.08.048.
[28] Q. Xia, E.B. Sifah, K.O. Asamoah, J. Gao, X. Du, M. Guizani, MeDShare: trust-less medical data sharing among cloud service providers via blockchain,
IEEE Access 5 (2017) 14757–14767.
[29] M. Mettler, Blockchain technology in healthcare: the revolution starts here, in: Proceedings of the 2016 IEEE 18th International Conference on
e-Health Networking, Applications and Services (Healthcom), IEEE, 2016, pp. 1–3.
[30] J. Zhang, N. Xue, X. Huang, A secure system for pervasive social network-based healthcare, IEEE Access 4 (2016) 9239–9250.
[31] A. Roehrs, C.A. da Costa, R. da Rosa Righi, OmniPHR: a distributed architecture model to integrate personal health records, J. Biomed. Inf. (2017).
[32] A. Azaria, A. Ekblaw, T. Vieira, A. Lippman, Medrec: using blockchain for medical data access and permission management, in: Proceedings of the
International Conference on Open and Big Data (OBD), IEEE, 2016, pp. 25–30.
[33] H. Zhao, Y. Zhang, Y. Peng, R. Xu, Lightweight backup and efficient recovery scheme for health blockchain keys, in: Proceedings of the 2017 IEEE 13th
International Symposium on Autonomous Decentralized System (ISADS), IEEE, 2017, pp. 229–234.
[34] M.A. Salahuddin, A. Al-Fuqaha, M. Guizani, K. Shuaib, F. Sallabi, Softwarization of internet of things infrastructure for secure and smart healthcare,
Computer 50 (7) (2017) 74–79.
[35] S. Angraal, H.M. Krumholz, W.L. Schulz, Blockchain technology: applications in health care, Circ.: Cardiovascul. Qual. Outcomes 10 (9) (2017) e0 0380 0.
[36] T.-T. Kuo, H.-E. Kim, L. Ohno-Machado, Blockchain distributed ledger technologies for biomedical and health care applications, J. Am. Med. Inf. Assoc.
24 (6) (2017) 1211–1220.
[37] U. Mukhopadhyay, A. Skjellum, O. Hambolu, J. Oakley, L. Yu, R. Brooks, A brief survey of cryptocurrency systems, in: Proceedings of the 2016 14th
Annual Conference on Privacy, Security and Trust (PST), IEEE, 2016, pp. 745–752.
[38] A. Nordrum, Wall street occupies the blockchain-financial firms plan to move trillions in assets to blockchains in 2018, IEEE Spectr. 54 (10) (2017)
40–45.
[39] J. Barkatullah, T. Hanke, Goldstrike 1: Cointerra’s first-generation cryptocurrency mining processor for bitcoin, IEEE Micro 35 (2) (2015) 68–76.
[40] J.H. Ziegeldorf, R. Matzutt, M. Henze, F. Grossmann, K. Wehrle, Secure and anonymous decentralized Bitcoin mixing, Fut. Gen. Comput. Syst. (2016).
[41] M. Laskowski, H.M. Kim, Rapid prototyping of a text mining application for cryptocurrency market intelligence, in: Proceedings of the 2016 IEEE 17th
International Conference on Information Reuse and Integration (IRI), IEEE, 2016, pp. 448–453.
[42] T.-H. Chang, D. Svetinovic, Data analysis of digital currency networks: namecoin case study, in: Proceedings of the 2016 21st International Conference
on Engineering of Complex Computer Systems (ICECCS), IEEE, 2016, pp. 122–125.
[43] W.-T. Tsai, R. Blower, Y. Zhu, L. Yu, A system view of financial blockchains, in: Proceedings of the 2016 IEEE Symposium on Service-Oriented System
Engineering (SOSE), IEEE, 2016, pp. 450–457.
[44] Q. Wang, B. Qin, J. Hu, F. Xiao, Preserving transaction privacy in bitcoin, Fut. Gen. Comput. Syst. (2017), doi:10.1016/j.future.2017.08.026.
[45] N. Vandezande, Virtual currencies under EU anti-money laundering law, Comput. Law Secur. Rev. 33 (3) (2017) 341–353.
[46] G. Giaglis, Money-over-IP from bitcoin to smart contracts and m2m money, in: Proceedings of the 2015 International Conference on Evaluation of
Novel Approaches to Software Engineering (ENASE), IEEE, 2015, pp. IS–5.
[47] P. Treleaven, R.G. Brown, D. Yang, Blockchain technology in finance, Computer 50 (9) (2017) 14–17.
[48] T. Aste, P. Tasca, T. Di Matteo, Blockchain technologies: the foreseeable impact on society and industry, Computer 50 (9) (2017) 18–28.
[49] I. Eyal, Blockchain technology: transforming libertarian cryptocurrency dreams to finance and banking realities, Computer 50 (9) (2017) 38–49.
[50] C. Khan, A. Lewis, E. Rutland, C. Wan, K. Rutter, C. Thompson, A distributed-ledger consortium model for collaborative innovation, Computer 50 (9)
(2017) 29–37.
[51] M.B. Taylor, The evolution of Bitcoin hardware, Computer 50 (9) (2017) 58–66.
[52] D. Magazzeni, P. McBurney, W. Nash, Validation and verification of smart contracts: a research agenda, Computer 50 (9) (2017) 50–57.
[53] Q.K. Nguyen, Blockchain-a financial technology for future sustainable development, in: Proceedings of the International Conference on Green Tech-
nology and Sustainable Development (GTSD), IEEE, 2016, pp. 51–54.
[54] J. Oudejans, Z. Erkin, et al., Decreg: a framework for preventing double-financing using blockchain technology, in: Proceedings of the ACM Workshop
on Blockchain, Cryptocurrencies and Contracts, ACM, 2017, pp. 29–34.
[55] A. Bogner, M. Chanson, A. Meeuw, A decentralised sharing App running a smart contract on the ethereum blockchain, in: Proceedings of the 6th
International Conference on the Internet of Things, ACM, 2016, pp. 177–178.
[56] R. Khalil, A. Gervais, Revive: rebalancing off-blockchain payment networks, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and
Communications Security, ACM, 2017, pp. 439–453.
[57] A. Judmayer, E. Weippl, Condensed cryptographic currencies crash course (c5), in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, ACM, 2016, pp. 1857–1858.
[58] S. Singh, N. Singh, Blockchain: future of financial and cyber security, in: Proceedings of the 2016 2nd International Conference on Contemporary
Computing and Informatics (IC3I), IEEE, 2016, pp. 463–467.
[59] B. Shala, U. Trick, A. Lehmann, B. Ghita, S. Shiaeles, Novel trust consensus protocol and blockchain-based trust evaluation system for m2m application
services, Internet Things 7 (2019) 10 0 058.
[60] P.R. Geraldo Filho, L.A. Villas, V.P. Gonçalves, G. Pessin, A.A.F. Loureiro, J. Ueyama, Energy-efficient smart home systems: Infrastructure and decision–
making process, Internet Things 5 (2019) 153–167.
[61] L. Carnevale, A. Celesti, A. Galletta, S. Dustdar, M. Villari, Osmotic computing as a distributed multi-agent system: the body area network scenario,
Internet Things 5 (2019) 130–139.
[62] M. Aly, F. Khomh, M. Haoues, A. Quintero, S. Yacout, Enforcing security in internet of things frameworks: a systematic literature review, Internet
Things (2019) 10 0 050.
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 17

[63] M.Á. Prada-Delgado, I. Baturone, G. Dittmann et al., PUF-derived IoT identities in a zeroknowledge protocol for blockchain, Internet Things, doi:10.
1016/j.iot.2019.10 0 057.
[64] A.A. Alli, M.M. Alam, SecOFF-FCIot: machine learning based secure offloading in fog-cloud of things for smart city applications, Internet Things 7
(2019) 10 0 070.
[65] S. Zeadally, A.K. Das, N. Sklavos, Cryptographic technologies and protocol standards for Internet Things, Internet Things (2019), doi:10.1016/j.iot.2019.
10 0 075.
[66] In Lee, The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model, Internet Things (2019), doi:10.1016/j.iot.
2019.10 0 078.
[67] A. Ravishankar Rao, D. Clarke, Perspectives on emerging directions in using IoT devices in blockchain applications, Internet Things (2019), doi:10.
1016/j.iot.2019.10 0 079.
[68] Q. Wang, X. Zhu, Y. Ni, et al., Blockchain for the IoT and industrial IoT: A review, Internet Things (2019), doi:10.1016/j.iot.2019.10 0 081.
[69] R. Han, On the Performance of Distributed Ledgers for Internet of Things, Internet Things (2019), doi:10.1016/j.iot.2019.10 0 087.
[70] D. Minoli, B. Occhiogrosso, Blockchain mechanisms for IoT security, Internet Things (2018), doi:10.1016/j.iot.2018.05.002.
[71] L. Bittencourt, R. Immich, R. Sakellariou, N. Fonseca, E. Madeira, M. Curado, L. Villas, L. da Silva, C. Lee, O. Rana, The Internet of Things, Fog and Cloud
Continuum: Integration and Challenges, Internet Things (2018), doi:10.1016/j.iot.2018.09.005.
[72] D. Mocrii, Y. Chen, P. Musilek, IoT-based smart homes: A review of system architecture, software, communications, privacy and security, Internet
Things 1 (2018) 81–98, doi:10.1016/j.iot.2018.08.009.
[73] P.I.R. Grammatikis, P.G. Sarigiannidis, I.D. Moscholios, Securing the Internet of Things: Challenges, threats and solutions, Internet Things (2019), doi:10.
1016/j.iot.2018.11.003.
[74] I. Thomas, S. Kikuchi, E. Baccelli, K. Schleiser, J. Doerr, A. Morgenstern, Design and implementation of a platform for hyperconnected cyber physical
systems, Internet Things 3 (2018) 69–81.
[75] C. Li, L.-J. Zhang, A blockchain based new secure multi-layer network model for internet of things, in: Proceedings of the 2017 IEEE International
Congress on Internet of Things (ICIOT), IEEE, 2017, pp. 33–41.
[76] D.W. Kravitz, J. Cooper, Securing user identity and transactions symbiotically: IoT meets blockchain, in: Proceedings of the Global Internet of Things
Summit (GIoTS), 2017, IEEE, 2017, pp. 1–6.
[77] K. Christidis, M. Devetsikiotis, Blockchains and smart contracts for the internet of things, IEEE Access 4 (2016) 2292–2303.
[78] N. Kshetri, Can blockchain strengthen the internet of things? IT Prof. 19 (4) (2017) 68–72.
[79] P.K. Sharma, S. Singh, Y.-S. Jeong, J.H. Park, Distblocknet: a distributed blockchains-based secure SDN architecture for IoT networks, IEEE Commun.
Mag. 55 (9) (2017) 78–85.
[80] M.A. Walker, A. Dubey, A. Laszka, D.C. Schmidt, PlaTIBART: A platform for transactive IoT blockchain applications with repeatable testing, in: Pro-
ceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, ACM, 2017, pp. 17–22.
[81] S.H. Hashemi, F. Faghri, P. Rausch, R.H. Campbell, World of empowered IoT users, in: Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE
First International Conference on, IEEE, 2016, pp. 13–24.
[82] S. Ibba, A. Pinna, M. Seu, F.E. Pani, Citysense: blockchain-oriented smart cities, in: Proceedings of the XP2017 Scientific Workshops, ACM, 2017, p. 12.
[83] M.S. Ali, K. Dolui, F. Antonelli, IoT data privacy via blockchains and IPFS, in: 7th International Conference for the Internet of Things, 2017.
[84] F. Buccafurri, G. Lax, S. Nicolazzo, A. Nocera, Overcoming limits of blockchain for IoT applications, in: Proceedings of the 12th International Conference
on Availability, Reliability and Security, ACM, 2017, p. 26.
[85] M. Samaniego, R. Deters, Using blockchain to push software-defined IoT components onto edge hosts, in: Proceedings of the International Conference
on Big Data and Advanced Wireless Technologies, ACM, 2016, p. 58.
[86] A. Boudguiga, N. Bouzerna, L. Granboulan, A. Olivereau, F. Quesnel, A. Roger, R. Sirdey, Towards better availability and accountability for IoT updates
by means of a blockchain, in: Proceedings of the IEEE Security and Privacy on the Blockchain (IEEE S&B 2017) an IEEE EuroS&P 2017 and Eurocrypt
2017 affiliated workshop, 2017.
[87] K. Biswas, V. Muthukkumarasamy, Securing smart cities using blockchain technology, in: Proceedings of the 2016 IEEE 18th International Conference
on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data
Science and Systems (HPCC/SmartCity/DSS), IEEE, 2016, pp. 1392–1393.
[88] A. Dorri, S.S. Kanhere, R. Jurdak, P. Gauravaram, Blockchain for IoT security and privacy: the case study of a smart home, in: Proceedings of the 2017
IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), IEEE, 2017, pp. 618–623.
[89] S. Huh, S. Cho, S. Kim, Managing IoT devices using blockchain platform, in: Proceedings of the 2017 19th International Conference on Advanced
Communication Technology (ICACT), IEEE, 2017, pp. 464–467.
[90] C.-F. Liao, S.-W. Bao, C.-J. Cheng, K. Chen, On design issues and architectural styles for blockchain-driven IoT services, in: Proceedings of the 2017
IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), IEEE, 2017, pp. 351–352.
[91] D. Svetinovic, Blockchain engineering for the internet of things: Systems security perspective, in: Proceedings of the 3rd ACM International Workshop
on IoT Privacy, Trust, and Security, ACM, 2017, p. 1.
[92] H. Shafagh, L. Burkhalter, A. Hithnawi, S. Duquennoy, Towards blockchain-based auditable storage and sharing of IoT data, in: Proceedings of the 2017
on Cloud Computing Security Workshop, ACM, 2017, pp. 45–50.
[93] A. Dorri, S.S. Kanhere, R. Jurdak, Towards an optimized blockchain for IoT, in: Proceedings of the Second International Conference on Inter-
net-of-Things Design and Implementation, ACM, 2017, pp. 173–178.
[94] M. Conoscenti, A. Vetrò, J.C. De Martin, Peer to peer for privacy and decentralization in the internet of things, in: Proceedings of the 39th International
Conference on Software Engineering Companion, IEEE Press, 2017, pp. 288–290.
[95] M. Samaniego, R. Deters, Blockchain as a service for IoT, in: Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and
IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData),
IEEE, 2016, pp. 433–436.
[96] M. Samaniego, R. Deters, Hosting virtual IoT resources on edge-hosts with blockchain, in: Proceedings of the 2016 IEEE International Conference on
Computer and Information Technology (CIT), IEEE, 2016, pp. 116–119.
[97] J. Lin, Z. Shen, C. Miao, Using blockchain technology to build trust in sharing loraWAN IoT, in: Proceedings of the 2nd International Conference on
Crowd Science and Engineering, ACM, 2017, pp. 38–43.
[98] Y. Zhang, J. Wen, The IoT electric business model: using blockchain technology for the internet of things, Peer-to-Peer Netw. Appl. 10 (4) (2017)
983–994.
[99] B. Lee, J.-H. Lee, Blockchain-based secure firmware update for embedded devices in an internet of things environment, J. Supercomput. 73 (3) (2017)
1152–1167.
[100] M. Giancaspro, Is a ‘smart contract’ really a smart idea? Insights from a legal perspective, Computer Law & Security Review: The International Journal
of Technology Law and Practice (2017), doi:10.1016/j.clsr.2017.05.007.
[101] I. Nath, Data exchange platform to fight insurance fraud on blockchain, in: Proceedings of the 2016 IEEE 16th International Conference on Data
Mining Workshops (ICDMW), IEEE, 2016, pp. 821–825.
[102] J. Kishigami, S. Fujimura, H. Watanabe, A. Nakadaira, A. Akutsu, The blockchain-based digital content distribution system, in: Proceedings of the 2015
IEEE Fifth International Conference on Big Data and Cloud Computing (BDCloud), IEEE, 2015, pp. 187–190.
[103] S. Fujimura, H. Watanabe, A. Nakadaira, T. Yamada, A. Akutsu, J.J. Kishigami, Bright: a concept for a decentralized rights management system based
on blockchain, in: Proceedings of the 2015 IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), IEEE, 2015, pp. 345–346.
18 B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107

[104] H. Hou, The application of blockchain technology in e-government in china, in: Proceedings of the 2017 26th International Conference on Computer
Communication and Networks (ICCCN), IEEE, 2017, pp. 1–4.
[105] C. Sullivan, E. Burger, E-residency and blockchain, Computer Law & Security Review: The International Journal of Technology Law and Practice (2017),
doi:10.1016/j.clsr.2017.03.016.
[106] A. Nordrum, Govern by blockchain dubai wants one platform to rule them all, while illinois will try anything, IEEE Spectr. 54 (10) (2017) 54–55.
[107] M.E. Peck, D. Wagman, Energy trading for fun and profit buy your neighbor’s rooftop solar power or sell your own-it’ll all be on a blockchain, IEEE
Spectr. 54 (10) (2017) 56–61.
[108] C. Rottondi, G. Verticale, A privacy-friendly gaming framework in smart electricity and water grids, IEEE Access 5 (2017) 14221–14233.
[109] E. Mengelkamp, J. Gärttner, K. Rock, S. Kessler, L. Orsini, C. Weinhardt, Designing microgrid energy markets: a case study: the brooklyn microgrid,
Appl. Energy 210 (2018) 870–880.
[110] J. Bergquist, A. Laszka, M. Sturm, A. Dubey, On the design of communication and transaction anonymity in blockchain-based transactive microgrids,
in: Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, ACM, 2017, p. 3.
[111] A. Laszka, A. Dubey, M. Walker, D. Schmidt, Providing privacy, safety, and security in IoT-based transactive energy systems using distributed ledgers,
in: Proceedings of the Seventh International Conference on the Internet of Things, ACM, 2017, p. 13.
[112] L. Wu, K. Meng, S. Xu, S. Li, M. Ding, Y. Suo, Democratic centralism: a hybrid blockchain architecture and its applications in energy internet, in:
Proceedings of the IEEE International Conference on Energy Internet (ICEI), IEEE, 2017, pp. 176–181.
[113] Y. Yuan, F.-Y. Wang, Towards blockchain-based intelligent transportation systems, in: Proceedings of the 2016 IEEE 19th International Conference on
Intelligent Transportation Systems (ITSC), IEEE, 2016, pp. 2663–2668.
[114] J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, E. Hossain, Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles
using consortium blockchains, IEEE Trans. Ind. Inf. 13 (6) (Dec. 2017) 3154–3164, doi:10.1109/TII.2017.2709784.
[115] A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C.P.A. Ogah, Z. Sun, Blockchain-based dynamic key management for heterogeneous intelligent transportation
systems, IEEE Internet Things J. 4 (6) (2017) 1832–1843.
[116] A. Fujihara, Powap: proof of work at proximity for a crowdsensing system for collaborative traffic information gathering, Internet Things (2019)
10 0 046.
[117] S. Mansfield-Devine, Beyond Bitcoin: using blockchain technology to provide assurance in the commercial world, Comput. Fraud Secur. 2017 (5)
(2017) 14–18.
[118] W. Li, A. Sforzin, S. Fedorov, G.O. Karame, Towards scalable and private industrial blockchains, in: Proceedings of the ACM Workshop on Blockchain,
Cryptocurrencies and Contracts, ACM, 2017, pp. 9–14.
[119] R. Xu, L. Zhang, H. Zhao, Y. Peng, Design of network medias digital rights management scheme based on blockchain technology, in: Proceedings of
the 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS), IEEE, 2017, pp. 128–133.
[120] v. Turk, R. Klinc, Potentials of blockchain technology for construction management, Proc. Eng. 196 (2017) 638–645.
[121] S. Delgado-Segura, C. Pérez-Solà, G. Navarro-Arribas, J. Herrera-Joancomartí, A fair protocol for data trading based on Bitcoin transactions, Fut. Gen.
Comput. Syst. (2017), doi:10.1016/j.future.2017.08.021.
[122] J.J. Sikorski, J. Haughton, M. Kraft, Blockchain technology in the chemical industry: machine-to-machine electricity market, Appl. Energy 195 (2017)
234–246.
[123] P.K. Sharma, M. Chen, J.H. Park, A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT, in: IEEE Access, 6, 2018,
pp. 115–124, doi:10.1109/ACCESS.2017.2757955.
[124] X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, L. Njilla, Provchain: a blockchain-based data provenance architecture in cloud environment with
enhanced privacy and availability, in: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, IEEE Press,
2017, pp. 468–477.
[125] F. Xiang, W. Huaimin, S. Peichang, F. Yingwei, W. Yijie, Jcledger: a blockchain based distributed ledger for jointcloud computing, in: Proceedings of
the 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), IEEE, 2017, pp. 289–293.
[126] R. Dennis, G. Owen, Rep on the block: A next generation reputation system based on the blockchain, in: Proceedings of the 2015 10th International
Conference for Internet Technology and Secured Transactions (ICITST), IEEE, 2015, pp. 131–138.
[127] A. Yasin, L. Liu, An online identity and smart contract management system, in: Proceedings of the 2016 IEEE 40th Annual Computer Software and
Applications Conference (COMPSAC), volume 2, IEEE, 2016, pp. 192–198.
[128] D. Roman, G. Stefano, Towards a reference architecture for trusted data marketplaces: the credit scoring perspective, in: Proceedings of the Interna-
tional Conference on Open and Big Data (OBD), IEEE, 2016, pp. 95–101.
[129] Y. Zhang, J. Wen, An IoT electric business model based on the protocol of bitcoin, in: Proceedings of the 2015 18th International Conference on
Intelligence in Next Generation Networks (ICIN), IEEE, 2015, pp. 184–191.
[130] J. Sidhu, Syscoin: A peer-to-peer electronic cash system with blockchain-based services for e-business, in: Proceedings of the 2017 26th International
Conference on Computer Communication and Networks (ICCCN), IEEE, 2017, pp. 1–6.
[131] F. Tian, An agri-food supply chain traceability system for China based on RFID & blockchain technology, in: Proceedings of the 2016 13th International
Conference on Service Systems and Service Management (ICSSSM), IEEE, 2016, pp. 1–6.
[132] M. Nakasumi, Information sharing for supply chain management based on block chain technology, in: Proceedings of the 2017 IEEE 19th Conference
on Business Informatics (CBI), volume 1, IEEE, 2017, pp. 140–149.
[133] F. Tian, A supply chain traceability system for food safety based on HACCP, blockchain & internet of things, in: Proceedings of the 2017 International
Conference on Service Systems and Service Management (ICSSSM), IEEE, 2017, pp. 1–6.
[134] H. Halpin, M. Piekarska, Introduction to security and privacy on the blockchain, in: Proceedings of the 2017 IEEE European Symposium on Security
and Privacy Workshops (EuroS&PW), IEEE, 2017, pp. 1–3.
[135] V. Gramoli, From blockchain consensus back to Byzantine consensus, Fut. Gen. Comput. Syst. (2017), doi:10.1016/j.future.2017.09.023.
[136] N. Alexopoulos, J. Daubert, M. Mühlhäuser, S.M. Habib, Beyond the hype: on using blockchains in trust management for authentication, in: Proceed-
ings of the 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, 2017, pp. 546–553.
[137] I. Zikratov, A. Kuzmin, V. Akimenko, V. Niculichev, L. Yalansky, Ensuring data integrity using blockchain technology, in: Proceedings of the 2017 20th
Conference of Open Innovations Association (FRUCT), IEEE, 2017, pp. 534–539.
[138] H. Wang, D. He, Y. Ji, Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography, Fut. Gen. Comput. Syst. (2017),
doi:10.1016/j.future.2017.06.028.
[139] B. Qin, J. Huang, Q. Wang, X. Luo, B. Liang, W. Shi, Cecoin: A decentralized PKI mitigating MitM attacks, Fut. Gen. Comput. Syst. (2017), doi:10.1016/j.
future.2017.08.025.
[140] N. Kshetri, Blockchain’s roles in strengthening cybersecurity and protecting privacy, Telecommun. Policy 41 (10) (2017) 1027–1038.
[141] L. Militano, A. Orsino, G. Araniti, M. Nitti, L. Atzori, A. Iera, Trust-based and social-aware coalition formation game for multihop data uploading in 5g
systems, Comput. Netw. 111 (2016) 141–151.
[142] C. Pinzón, C. Rocha, Double-spend attack models with time advantage for Bitcoin, Electr. Notes Theor. Comput. Sci. 329 (2016) 79–103.
[143] D. Bradbury, The problem with Bitcoin, Comput. Fraud Secur. 2013 (11) (2013) 5–8.
[144] S. Feld, M. Schönfeld, M. Werner, Analyzing the deployment of Bitcoin’s p2p network under an AS-level perspective, Proced. Comput. Sci. 32 (2014)
1121–1126.
[145] A. Gervais, G.O. Karame, K. Wüst, V. Glykantzis, H. Ritzdorf, S. Capkun, On the security and performance of proof of work blockchains, in: Proceedings
of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2016, pp. 3–16.
B.K. Mohanta, D. Jena and S.S. Panda et al. / Internet of Things 8 (2019) 100107 19

[146] M. Chanson, A. Bogner, F. Wortmann, E. Fleisch, Blockchain as a privacy enabler: an odometer fraud prevention system, in: Proceedings of the 2017
ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable
Computers, ACM, 2017, pp. 13–16.
[147] N. Kshetri, J. Voas, Do crypto-currencies fuel ransomware? IT Prof. 19 (5) (2017) 11–15.
[148] J. Sousa, A. Bessani, M. Vukolic, A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform, in: 2018 48th Annual
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE, 2018, pp. 51–58.
[149] C. Natoli, V. Gramoli, The blockchain anomaly, in: Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applica-
tions (NCA), IEEE, 2016, pp. 310–317.
[150] L. Luu, D.-H. Chu, H. Olickel, P. Saxena, A. Hobor, Making smart contracts smarter, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer
and Communications Security, ACM, 2016, pp. 254–269.
[151] G. Karame, On the security and scalability of Bitcoin’s blockchain, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communi-
cations Security, ACM, 2016, pp. 1861–1862.
[152] V. Sharma, I. You, G. Kul, Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain, in: Proceedings of the
2017 international workshop on managing insider security threats, ACM, 2017, pp. 81–84.
[153] N. Zhang, S. Zhong, L. Tian, Using blockchain to protect personal privacy in the scenario of online taxi-hailing, International Journal of Computers,
Communications & Control 12 (6) (2017).

View publication stats

You might also like