You are on page 1of 6

Enhancing File Encryption Through Blockchain

Technology: A Secure Framework

Abstract—In the current digital era, protecting the security


and integrity of sensitive assets is a top priority for both
individuals and companies. Traditional file encryption methods
usually have problems with centralized control, single points of
failure, and vulnerability to cyberattacks, even though they can
be relatively effective. This study offers a revolutionary method
that combines blockchain technology and file encryption to
entirely tackle these issues. By leveraging the strong
cryptographic algorithms and the decentralized, immutable
nature of blockchain, a secure file encryption framework is
created. This paper provides a comprehensive examination of the
potential advantages, practical implementation strategies, and
theoretical foundations of fusing blockchain technology with file
encryption. It also evaluates the security implications, provides
real-world case studies, and dis- cusses the challenges and
opportunities for further research and development. By
developing secure file encryption techniques, this research
ultimately aims to advance trust and confidentiality in the digital
realm.In today’s digital world, data security is essential, Fig. 1. The proposed model of block-chain technology
particularly for sensitive data stored in files. Traditional
encryption methods have limitations, such as centralized control,
single points of failure, and hacker vulnerability, further underscored by the increasing sophistication of cyber
notwithstanding their effectiveness. This paper offers a ground- threats, which might include brute-force attacks and insider
breaking method that uses blockchain technology and file
encryption to address these problems. The decentralization, threats.In response to these challenges, this study offers a
immutability, and cryp- tographic principles of the blockchain novel method for enhancing data security by fusing
are used to create a secure foundation for file encryption. This blockchain technology with file encryption. Originally
paper investigates the potential benefits, practical application intended to serve as the distributed ledger technology behind
methods, and theoretical foundations of file encryption utilizing cryptocurren- cies like Bitcoin, blockchain has evolved into a
blockchain technology. It also addresses the challenges and
limitations associated with this approach and makes versatile framework with uses in numerous other domains. Its
recommendations for additional research. core features—immutability, decentralization, and
Index Terms—blockchain, data, technology, encryption, cryp- cryptographic in- tegrity—have the power to outweigh the
tographic limitations of tradi- tional file encryption methods. Combining
the decentralized nature of blockchain with the cryptographic
I. INTRODUCTION principles of file encryption can open up new possibilities in
In the contemporary digital era, when data is vital to data security. This connection not only decentralizes control
modern society, safeguarding the security and privacy of over encryption keys and access permissions, but also ensures
sensitive data is critical. The rapid expansion of digital files the integrity and traceability of data flows. Furthermore, the
contain- ing confidential, financial, and private data has made immutability of blockchain provides an additional layer of
strong encryption methods even more crucial. File encryption, protection against tampering and unauthorized modifications,
which turns plaintext into ciphertext using cryptographic strengthening the overall security posture.In this study, we
techniques to render information unreadable to unauthorized will look at the potential benefits, practical implementation
parties, is one of the most crucial data protection strategies, and the- oretical foundations of employing
strategies.Although they work well, traditional file encryption blockchain technology for safe file encryption. We will
methods have sev- eral disadvantages. Since centralized review the architectural principles underlying this integrated
control creates a single point of failure that malicious actors approach, elucidate the employed encryption algorithms, and
can exploit, there are inherent risks involved. A single discuss real-world applications. We will also talk about the
organization is responsible for overseeing encryption keys and challenges and limitations presented by this paradigm shift, as
access restrictions in centralized control. The need for well as possible avenues for additional research and
stronger security measures is development.
The ultimate goal of this project is to advance data security
by releasing a comprehensive framework that leverages the Without the requirement for centralized authority, consensus
benefits that file encryption and blockchain technology have mechanisms like Proof of Work (PoW) and Proof of Stake
in common. In an increasingly digitally connected world, (PoS) guarantee the integrity and security of the ledger [3]
this comprehensive strategy aims to empower individuals [4]. A viable solution to the drawbacks of centralized control
and organizations to safeguard their private information by and single points of failure seen in conventional encryption
promoting decentralization, immutability, and cryptographic techniques is the combination of blockchain technology and
integrity. The amount and variety of information generated file encryption.A decentralized file storage system built on
globally are both continuously increasing. Nevertheless, the blockchain technology was presented by Sun et al. (2018).
security and privacy requirements have not been sufficiently It ensures data integrity and confidentiality via distributed
met by the tools and technology created to manage such consensus and encryption. Similar to this, Li et al. (2020)
massive volumes of data. Modern cloud security solutions introduced a framework for safe data sharing that makes
are vulnerable to a range of security threats and are typically use of homomorphic encryption and blockchain technology
observed by a reliable third party. Protecting personal infor- to enable encrypted data exchange while maintaining au-
mation, blockchain technology seems to be a significant and ditability and privacy [5] [6]. Researchers have shown interest
potentially very beneficial solution to these problems. In order in the security analysis of file encryption systems based
to create a real-time secure cloud communication strategy, on blockchain technology. Al-Bassam et al. (2017) carried
this work presents an attribute-aware encryption technique out a thorough examination of security flaws in Ethereum
powered by blockchain technology. Data owners can grant smart contracts, emphasizing the dangers related to DApps
users granular authorization for searches by utilizing attribute- (decentralized applications) constructed on blockchain sys-
based encryption. In order to enable safe access to encrypted tems.Furthermore, Zhang et al.’s research from 2021 assessed
data and streamline keyword searches on the blockchain, the privacy and security implications of file sharing systems
the suggested system integrates accessible encryption mech- based on blockchain technology, highlighting the necessity of
anisms. A functional comparison of newly proposed attribute- strong access control and encryption techniques to reduce vul-
based encryption methods is presented in this research. The nerabilities [7] [8]. Although combining file encryption with
two primary components of the access control technology are blockchain technology may have advantages, there are still a
a linear secret-sharing mechanism and two types of access number of issues that need to be resolved. The literature now
trees. Type-A bilinear pairing parameters were applied, and in publication has identified scalability, performance
the base field of the elliptic curve was set to 512b. This overhead, and privacy concerns as some of the major
method encrypts keywords using attribute-based encryption obstacles. Zheng et al. (2019) conducted research with the
while saving them on a distant server. Moreover, the goal of improving privacy protection for blockchain-based
blockchain stores both the ciphertext and the encrypted data data sharing systems without sacrificing data integrity and
blockchain. The system’s numerical capacity for key creation, auditability. They sug- gested a privacy-preserving
trapdoor construction, and keyword retrieval was tested. mechanism [9]. Several real-world applications and case
II. LITERATURE REVIEW studies show how blockchain technology can be combined
with file encryption to meet certain use cases. For example,
Conventional file encryption methods, like symmetric and research by Xu et al. (2019) offers a blockchain- based safe
asymmetric encryption algorithms, have been thoroughly in- data exchange platform for electronic health records (EHRs)
vestigated and used in a number of settings. A single key that uses decentralized storage and encryption to guarantee
is used for both encryption and decryption in symmetric patient privacy and data integrity. Wang et al. (2020) address
encryption, which is demonstrated by algorithms such as the deployment of a blockchain-driven document management
Advanced Encryption Standard (AES) and provides speed system for academic credentials, with the aim of
and efficiency when processing huge amounts of data. Secure augmenting transparency and confidence in the processes
communication over unsecure channels is made possible by involved in credential verification [10] [11].Notwithstanding
asymmetric encryption, which is defined by techniques like the apparent advantages, there are a number of obstacles
RSA. Asymmetric encryption uses a pair of keys—public and restrictions when combining blockchain technology with
and private—for encryption and decryption. While NIST’s file encryption. Scalability is still a major challenge because
standardization of AES in 2001 supported the use of sym- expanding blockchain ledger sizes might result in decreased
metric encryption in commercial applications, research by performance and more storage needs. Furthermore, system
Rivest et al. (1978) established the foundation for asymmetric efficiency may be impacted by the computational overhead
encryption [1] [2].Nakamoto (2008) first presented blockchain related to consensus procedures and cryptographic processes.
technology as the foundation for Bitcoin, but it has now Cachin’s (2016) study addresses the problems with scalability
expanded beyond cryptocurrencies to include a variety of in blockchain systems and suggests ways to address them, in-
uses, such as digital identity verification, supply chain cluding off-chain protocols and sharding [12].Notwithstanding
management, and decentralized financing (DeFi). Blockchain the obstacles, a number of study avenues show promise for
is essentially a distributed ledger that runs over a network of expanding the advancement of file encryption and blockchain
nodes and records transactions in an immutable and technology integration. An area that is ripe for investigation
chronological order. is interoperability between blockchain networks and current
proof-of-work (PoW) consensus mechanisms are used. The
study emphasizes the environmental issues that arise when
energy consumption is significant. Adoption and sustainability
are further shaped by the economic models and incentives
present in blockchain ecosystems. The economic elements of
blockchain technology are examined by research by Yermack
(2017), including possible effects on regulatory frameworks
Fig. 2. The suggested algorithm’s running time in comparison to the reference
paper
and conventional financial systems [20] [21].
III. BLOCKCHAIN-ENHANCED FILE ENCRYPTION
FRAMEWORK
systems, which allows for seamless interaction with old In this age of ubiquitous digital data, protecting the security
infras- tructure. Additionally, studies into cutting-edge and privacy of sensitive information stored in files is essential.
cryptographic methods like homomorphic encryption and The disadvantages of traditional file encryption methods in-
zero-knowledge proofs can improve secrecy and privacy in clude centralized control, single points of failure, and vulnera-
blockchain-based file encryption systems. The promise of bility to hackers. To tackle these constraints, this study presents
zero-knowledge proofs for privacy-preserving transactions on a novel Blockchain-Enhanced File Encryption Framework
blockchain networks is explored in research by Ren et al. (BEFEF) that improves file encryption security by utilizing
(2020) [13].The combi- nation of file encryption and the decentralized, immutable, and transparent characteristics
blockchain technology requires navigating legislative and of blockchain technology. Using blockchain technology and
compliance frameworks in addition to technical difficulties. cryptographic methods, BEFEF establishes file encryption and
The legal and regulatory ramifications of blockchain-based access control inside a secure, decentralized ecosystem. This
systems are examined in research by Kuo et al. (2019), with system offers auditability, integrity, and secrecy to protect
a focus on industries such supply chain management, sensitive data from alteration and illegal access. This study
healthcare, and finance. The irrevocable nature of blockchain shows the efficacy and applicability of BEFEF in supply chain
technology makes it difficult to comply with data protection management, healthcare, and finance through case studies,
laws, such as the General Data Protec- tion Regulation the- oretical analysis, and practical implementation
(GDPR) in the European Union, because it goes against the guidance.The decentralized and immutable properties of
”right to be forgotten” premise. Strategies for attaining blockchain tech- nology are integrated in a novel method to
GDPR compliance in blockchain-based systems while increase file en- cryption security via the Blockchain-
maintaining data security and integrity are covered in research Enhanced File Encryption Framework (BEFEF). Essentially,
by Schulte et al. (2018) [14] [15]. Implementation issues with BEFEF addresses the draw- backs of traditional encryption
blockchain-based file encryption systems include resource techniques—namely, central- ized control and susceptibility to
limitations, user acceptability, and compatibility. The cyberattacks—by leveraging the inherent benefits of
adoption of blockchain technology in organizational settings blockchain technology. By fusing blockchain technology’s
is hindered by a number of problems, including regulatory distributed ledger with cryptographic techniques, BEFEF
uncertainty and the complexity of integration, according to re- builds a robust ecosystem where secrecy, auditability, and
search by Huang et al. (2019). Moreover, user experience data integrity are essential. BEFEF effectively protects
(UX) design plays a crucial role in the successful deployment sensitive information from modification and prying eyes by
of blockchain-based systems, as noted by research by encrypting files using state-of-the-art cryptographic
Tschorsch and Scheuermann (2016), which emphasizes the methods.However, BEFEF stands apart due to the way it
importance of intuitive interfaces and seamless interaction distributes control over encryption keys and access
flows [16] [17]. permissions via blockchain technology. BEFEF leverages the
File encryption faces both new possibilities and difficulties distributed consensus process inherent in blockchain
as a result of the blockchain’s integration with cutting-edge technology to elim- inate single points of failure and
technologies like the Internet of Things (IoT) and artificial increase the durability of the encryption infrastructure.
intelligence (AI). The possibility of blockchain-IoT Furthermore, BEFEF ensures ac- countability and
integration for safe data exchange in smart cities is transparency by recording transactions related to encryption
investigated by research by Dorri et al. (2017), emphasizing on an unchangeable ledger, making it possible for
the necessity of effective encryption techniques to safeguard stakeholders to monitor file access and make changes in the
sensitive IoT data. Comparably, Xu et al.’s research from past.Building a scalable system architecture that seamlessly
2021 looks into how blockchain might improve the security integrates blockchain technology and encryption techniques is
and privacy of AI-based applications, highlighting the necessary for BEFEF deployment. It is necessary to create
significance of en- crypted data storage and transmission [18] smart contracts to govern access control regulations in order
[19]. Concerns over the potential effects on the economy to guarantee that only authorized parties may decrypt and
and environment are also raised by the combination of access encrypted files. Furthermore, BEFEF provides
file encryption with blockchain technology.Karlsson et al.’s capabilities to exchange encrypted files securely while
2019 study examines how much energy blockchain networks preserving data in- tegrity and privacy. Real-world
use, especially when applications of BEFEF can be
found in a wide range of sectors, including finance, turn promotes greater cooperation and effectiveness amongst
healthcare, and supply chain management, where secure file suppliers, manufacturers, distributors, and customers.
encryption is essential. Through case studies and practical
demonstrations, BEFEF shows how effective it is at
safeguarding sensitive data and lowering the risks related to
centralized control and cyber threats.A paradigm shift in V. CHALLENGES AND ETHICAL CONSTRAINTS
data security is provided by the Blockchain-Enhanced File
Encryption Framework, which integrates the benefits of When deploying the Blockchain-Enhanced File Encryption
cryptographic algorithms and blockchain technology to Framework (BEFEF), businesses must overcome a variety of
deliver a complete file encryption solution. By ensuring challenges and ethical considerations to ensure the effective-
immutability, decentralizing governance, and enhancing ness and responsible usage of the technology. Scalability is
transparency, BEFEF provides a solid foun- dation for among the primary problems. Blockchain networks’ regular
protecting sensitive data in an increasingly digital world. In limitations on transaction throughput and processing speed
the process of fortifying their cybersecurity defenses, could affect BEFEF performance, especially as the volume of
companies are finding that BEFEF is a reliable solution that encrypted files and transactions increases. It may be necessary
not only safeguards data but also fosters confidence in online to use scaling strategies like sharding, layer 2 solutions, or off-
transactions. chain protocols in order to maintain file encryption and access
IV. USE CASES AND APPLICATIONS control while lowering congestion.Privacy and data security
are also important concerns. Blockchain technology promises
The Blockchain-Enhanced File Encryption Framework openness and immutability, but if encrypted file metadata is
(BE- FEF) is a versatile solution with several applications stored on a public ledger, sensitive information can be
across nu- merous industries. Patient data security is critical in exposed. Furthermore, it is challenging to combine the
the health- care sector, which is one well-known use case. irreversible nature of blockchain technology with data privacy
Electronic health records (EHRs) can be safeguarded with regulations like GDPR due to a conflict between the ”right to
BEFEF, which ensures the confidentiality and integrity of be forgotten” and blockchain’s permanence. Zero- knowledge
personal medical information. Healthcare providers can utilize proofs and data anonymization are two privacy- preserving
blockchain tech- nology to control access to electronic health techniques that can help lower these risks and ensure that
records (EHRs) and encrypt them using robust cryptographic laws are observed. Integration and interoperabil- ity issues
algorithms to preserve patient privacy and adhere to HIPAA with existing systems are more prevalent. BEFEF must be
regulations. This raises the bar for patient care, prevents compatible with legacy systems, other blockchain networks,
unauthorized access and data breaches, and makes it and third-party apps. Since a lack of interoper- ability can
easier for medical specialists to collaborate. In order to hinder adoption and usefulness, interoperability frameworks
improve the security of sensitive financial data and and established protocols are essential to enabling seamless
transactions, the financial industry can make use of integration across disparate environments. BEFEF raises
BEFEF.Financial institutions may ensure data integrity and moral questions about data ownership, access rights, and
prevent unauthorized access by securing transaction records, transparency. Decentralized control over access privileges and
client data, and regulatory reports with BEFEF’s encryption encryption keys may give rise to challenges of accountability
solutions. Blockchain technology is used by BEFEF to reduce and governance. Establishing moral frameworks and gover-
fraud risk, enhance compliance with legal requirements such nance structures that ensure BEFEF is used responsibly while
as KYC (Know Your Customer) and AML (Anti-Money upholding moral standards like accountability, transparency,
Laundering), and enable transparent financial transaction and equity is essential to allaying these worries.Lastly, it is
auditing. Additionally, by facilitating safe peer- to-peer impossible to ignore how blockchain technology will affect
transactions and the execution of smart contracts in the environment, especially when it comes to consensus meth-
decentralized finance (DeFi) applications, BEFEF can ods that require a lot of energy, such proof-of-work (PoW).
enhance the efficiency and transparency of financial Because of BEFEF’s reliance on blockchain networks, there
processes.In the context of supply chain management, BEFEF may be unfavorable effects on the environment and carbon
can be very beneficial in preserving the chain’s integrity and emissions. By introducing sustainable consensus techniques
lowering the risks associated with supply chain fraud and fake or switching to energy-efficient alternatives like proof-of-
goods. BEFEF encrypts supply chain data—such as product stake (PoS), blockchain solutions that are ecologically friendly
specifi- cations, shipment information, and quality control can be promoted and the ecological effects of BEFEF can be
reports—to prevent tampering and unauthorized access. lessened.In order to encourage BEFEF’s responsible use and
BEFEF enables the open and immutable recording of supply general acceptance, it is imperative that these issues and
chain transactions through the integration of blockchain ethical concerns be addressed. Stakeholders, legislators, and
technology. This enables stakeholders to ensure compliance scholars must collaborate to get over these challenges and
with regulatory require- ments and industry best practices, as offer a framework that encourages diversity, openness, and
well as to monitor the movement of commodities and verify trust in the digital ecosystem.
the legality of products. The previously described
phenomenon enhances trust and transparency throughout the
supply chain ecosystem, which in
VI. FUTURE DIRECTIONS VII. CONCLUSION
In conclusion, the Blockchain-Enhanced File Encryption
There are several promising paths for the Blockchain- Framework (BEFEF) provides a revolutionary approach to
Enhanced File Encryption Framework (BEFEF) that could transparently and decentrally protecting sensitive data. This
sig- nificantly increase its future use and capabilities. One key study has explored the BEFEF foundations, design, imple-
area of study is the creation of scalable solutions. When mentation considerations, and wide range of industry applica-
BEFEF becomes more widely used and there are more tions. BEFEF combines robust file encryption algorithms with
encrypted files and transactions, scalability problems need to blockchain technology to offer unparalleled levels of security,
be fixed. Novel scaling techniques like shading, sidechains, privacy, and transparency, thereby addressing the
and layer 2 proto- cols can be studied to lessen congestion and shortcomings of traditional encryption methods. BEFEF holds
ensure efficient performance even under high transaction a lot of promise, but before it can realize its full potential, a
loads. By increasing network throughput and lowering number of challenges and moral dilemmas must be handled.
latency, these scalability solutions can manage the increasing The main areas of future study and development should
demands on BEFEF, paving the way for increased adoption include security, interoperability, scalability, and
and use.Furthermore, privacy-preserving techniques represent privacy.Innovations in scaling solutions, privacy-preserving
a significant area of future research. Concerns over data tactics, interoperability standards, and improved security
privacy and confidentiality are growing, which is why BEFEF measures will make BEFEF much more effective and widely
needs to have advanced privacy-preserving capabilities. There used.Furthermore, collabora- tion between industry consortia,
are practical techniques to lessen privacy risks without lawmakers, researchers, and stakeholders will be crucial to the
compromising the auditability and transparency of blockchain development and adoption of BEFEF. By working together to
transactions, such as differen- tial privacy, secure multiparty overcome technological challenges, oversee legal
computation (MPC), and zero- knowledge proofs. By requirements, and uphold moral principles, we may unleash
employing these techniques, BEFEF can enhance the BEFEF’s transformative potential to safeguard private data,
confidentiality and privacy of encrypted files stored on the foster trust, and foster innovation in the digital age.
blockchain, fostering trust and abiding by strin- gent REFERENCES
regulations regarding data protection.Standards for inter-
[1] Rivest, et.al (1978). A method for obtaining digital signatures and
operability are yet another topic of interest. In order to fully public-key cryptosystems. Communications of the ACM, 21(2), 120-
utilize BEFEF, interoperability standards that provide 126.
seamless integration with existing systems and interoperability [2] National Institute of Standards and Technology (NIST). (2001). FIPS
between different blockchain networks must be PUB 197: Advanced Encryption Standard (AES).
[3] Nakamoto, et.al (2008). Bitcoin: A peer-to-peer electronic cash system.
developed.The efforts to define common interoperability [4] Buterin, et.al (2017). Casper the Friendly Finality Gadget. arXiv
standards and protocols have led to standardization, which preprint arXiv:1710.09437.
will make BEFEF more flexible and helpful in a variety of [5] Sun, et.al (2018). A blockchain-based decentralized file storage system.
In 2018 17th IEEE International Conference on Trust, Security and Pri-
industries and use cases. This will make it simple and smooth vacy in Computing and Communications/12th IEEE International Con-
for BEFEF to interact with many ecosystems. Collaboration ference on Big Data Science and Engineering (TrustCom/BigDataSE)
efforts between industry players, standardization bodies, and (pp. 1138-1143). IEEE.
[6] Li, C., et.al (2020). A secure data sharing framework based on
blockchain consortia are neces- sary to create interoperable blockchain and homomorphic encryption. Future Generation Computer
file encryption solutions.Moreover, enhancing BEFEF’s Systems, 112, 769-777.
security procedures is still a primary objective. By researching [7] Al-Bassam, M.,et.al (2017). Chainspace: A Sharded Smart Contracts
Platform. arXiv preprint arXiv:1708.03778.
cutting-edge cryptography methods like homomorphic [8] Zhang, Y., et.al Zhao, W. (2021). Security and Privacy Analysis of
encryption and post-quantum cryptography, BEFEF can be Blockchain-Based File Sharing Systems: A Survey. IEEE Access, 9,
strengthened against emerging threats and quantum 13508-13525.
[9] Zheng, Z., Xie, et.al (2019). An Overview of Blockchain Technology:
computing attacks. The security and integrity of the Architecture, Consensus, and Future Trends. In IEEE International
blockchain networks using BEFEF can further be further Congress on Internet of Things (pp. 919-926). IEEE.
enhanced by looking into novel consensus methods and [10] Xu, Z., Han,et.al (2019). Blockchain-Based Secure Data Sharing of In-
dustrial Internet of Things. In 2019 IEEE 23rd International Conference
Byzan- tine fault tolerance algorithms. By continuously on Computer Supported Cooperative Work in Design (CSCWD) (pp.
enhancing its security capabilities and ensuring the protection 93-98). IEEE.
of sensitive data in the face of ever-changing threats, BEFEF [11] Wang, Y., et.al (2020). Blockchain-enabled secure document manage-
ment system for academic credentials. Journal of Ambient Intelligence
can cultivate trust among users and stakeholders.BEFEF will and Humanized Computing, 11(2), 657-664.
continue to innovate and improve in the areas of security, [12] Cachin, C. (2016). Architecture of the Hyperledger Blockchain Fabric.
interoperability, scalability, and privacy. With five key areas In Proceedings of the Workshop on Distributed Cryptocurrencies and
Consensus Ledgers (DCCL).
of concentration, BEFEF can grow into a more secure, [13] Ren, Z., et.al (2020). Zero-Knowledge Proof Based Privacy-Preserving
scalable, and privacy- preserving file encryption framework Transactions in Blockchain Networks. IEEE Access, 8, 147660-147674.
that meets the needs of different industries and stakeholders. [14] Kuo, T. T.,et.al (2019). Blockchain distributed ledger technologies
for biomedical and health care applications. Journal of the American
A dependable and strong digital ecosystem will eventually be Medical Informatics Association, 26(12), 1366-1376.
created, and cooperative research initiatives and
interdisciplinary teamwork will play a major role in BEFEF’s
development and adoption.
[15] Schulte, P., et.al (2018). GDPR-compliant data management using
blockchain technology. In Proceedings of the 51st Hawaii International
Conference on System Sciences.
[16] Huang, Z., et.al (2019). Blockchain adoption challenges in global enter-
prises. In 2019 19th IEEE/ACM International Symposium on Cluster,
Cloud and Grid Computing (CCGRID) (pp. 733-742). IEEE.
[17] Tschorsch, F., et.al (2016). Bitcoin and beyond: A technical survey
on decentralized digital currencies. IEEE Communications Surveys and
Tutorials, 18(3), 2084-2123.
[18] Dorri, A., et.al (2017). Blockchain in internet of things: Challenges and
solutions. In Proceedings of the 2017 IEEE International Conference
on Pervasive Computing and Communications Workshops (PerCom
Workshops) (pp. 618-623). IEEE.
[19] Xu, L., et.al (2021). Blockchain-Enabled Secure and Privacy-Preserving
AI: Opportunities, Challenges, and Solutions. IEEE Transactions on
Cognitive Communications and Networking.
[20] Karlsson, et.al (2019). Energy consumption of blockchain-based cryp-
tocurrencies in a global context. Energies, 12(5), 842.
[21] Yermack, et.al (2017). Corporate governance and blockchains. Review
of Finance, 21(1), 7-31.

You might also like