|
Part I Basic Concepts and Mechanisms of Blockchain in Internet of Things |
|
|
|
|
3 | (6) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
1.4 Blockchain Applications in Internet of Things |
|
|
5 | (1) |
|
1.5 Security and Privacy in Internet of Things |
|
|
6 | (3) |
|
2 Blockchain and Internet of Things |
|
|
9 | (20) |
|
|
9 | (1) |
|
2.2 Technical Dimensions of Blockchain |
|
|
10 | (10) |
|
|
10 | (6) |
|
2.2.2 Consensus Mechanisms |
|
|
16 | (2) |
|
2.2.3 Key Characteristics |
|
|
18 | (1) |
|
2.2.4 Applications of Blockchain |
|
|
19 | (1) |
|
2.3 Key Issues in Internet of Things |
|
|
20 | (8) |
|
2.3.1 Fundamental Concepts in Internet of Things |
|
|
20 | (2) |
|
2.3.2 Architecture of Internet of Things |
|
|
22 | (1) |
|
2.3.3 Evaluation Metrics of Internet of Things |
|
|
23 | (1) |
|
2.3.4 Function Enhancement |
|
|
24 | (3) |
|
2.3.5 Applications of Internet of Things |
|
|
27 | (1) |
|
|
28 | (1) |
|
3 Security and Privacy Issues in Internet of Things |
|
|
29 | (14) |
|
|
29 | (1) |
|
3.2 Security Issues in Internet of Things |
|
|
30 | (5) |
|
|
30 | (2) |
|
|
32 | (2) |
|
|
34 | (1) |
|
3.3 Privacy Concerns in Internet of Things |
|
|
35 | (4) |
|
|
35 | (1) |
|
|
36 | (2) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (4) |
|
Part II Blockchain in Privacy-Preserving Cloud Data Storage Services |
|
|
|
4 Blockchain-Enabled Cloud Data Preservation Services |
|
|
43 | (10) |
|
|
43 | (1) |
|
4.2 Technical Dimensions in Cloud Data Preservation Services |
|
|
44 | (2) |
|
4.2.1 Essential Components |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
4.3 Basic Techniques in Cloud Data Preservation Services |
|
|
46 | (3) |
|
4.3.1 Preservation Submission |
|
|
46 | (1) |
|
4.3.2 Primitiveness Verification |
|
|
47 | (2) |
|
|
49 | (2) |
|
|
50 | (1) |
|
4.4.2 Primitiveness Identification |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
5 Blockchain-Enabled Controllable Data Management |
|
|
53 | (14) |
|
|
53 | (1) |
|
5.2 Technical Dimensions in Blockchain-Based Controllable Data Management |
|
|
54 | (2) |
|
5.2.1 Essential Components |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
5.3 Bridging Blockchain with Data Management |
|
|
56 | (1) |
|
|
56 | (3) |
|
5.4.1 System Initialization |
|
|
56 | (1) |
|
5.4.2 Document Modification |
|
|
57 | (1) |
|
5.4.3 Document Management |
|
|
57 | (1) |
|
|
58 | (1) |
|
5.4.5 Voting and Counting |
|
|
58 | (1) |
|
|
59 | (1) |
|
5.5.1 Experiment Evaluation |
|
|
59 | (1) |
|
|
59 | (8) |
|
Part III Privacy-Preserving Blockchain Technology in Internet of Things |
|
|
|
6 Blockchain-Enabled Vehicle Electricity Transaction Services |
|
|
67 | (8) |
|
|
67 | (2) |
|
6.2 Technical Dimensions in Vehicle Electricity Transactions Services |
|
|
69 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
6.4 Implementation Scenario |
|
|
72 | (1) |
|
|
73 | (2) |
|
7 Blockchain-Enabled Carpooling Services |
|
|
75 | (18) |
|
|
75 | (1) |
|
7.2 Technical Dimensions in Carpooling Services |
|
|
76 | (3) |
|
7.2.1 Essential Components in Carpooling Services |
|
|
76 | (2) |
|
7.2.2 Cognize Threat Model |
|
|
78 | (1) |
|
7.2.3 Anticipated Performance Matrix |
|
|
78 | (1) |
|
7.3 Basic Techniques of Carpooling Services |
|
|
79 | (2) |
|
7.3.1 Anonymous Authentication |
|
|
79 | (1) |
|
7.3.2 Private Proximity Test with Location Tags |
|
|
80 | (1) |
|
7.3.3 Privacy-Preserving Range Query |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (6) |
|
7.4.1 System Initialization |
|
|
82 | (1) |
|
7.4.2 Entity Registration |
|
|
82 | (1) |
|
7.4.3 Carpooling Requesting |
|
|
83 | (1) |
|
7.4.4 Carpooling Responding |
|
|
84 | (1) |
|
7.4.5 Carpooling Matching and Uploading |
|
|
84 | (3) |
|
7.4.6 Carpooling Termination and Cancellation |
|
|
87 | (1) |
|
|
87 | (1) |
|
7.5 Use Case of Blockchain-Assisted Carpooling in Vehicular Networks |
|
|
87 | (3) |
|
7.5.1 Computational Cost in Carpooling |
|
|
87 | (2) |
|
7.5.2 Communication Overhead in Carpooling |
|
|
89 | (1) |
|
7.5.3 Experiments on Private Blockchain |
|
|
89 | (1) |
|
|
90 | (3) |
|
8 Blockchain-Enabled Ride-Hailing Services |
|
|
93 | (16) |
|
|
93 | (2) |
|
8.2 Technical Dimensions in Ride-Hailing Services |
|
|
95 | (2) |
|
8.2.1 Crucial Components in Ride-Hailing Services |
|
|
95 | (1) |
|
8.2.2 Comprehend Threat Model |
|
|
96 | (1) |
|
8.2.3 Expected Performance Objectives |
|
|
96 | (1) |
|
8.3 Basic Techniques of Ride-Hailing Services |
|
|
97 | (1) |
|
8.3.1 Conjunctive Query Processing |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (5) |
|
8.4.1 System Initialization |
|
|
98 | (1) |
|
8.4.2 Entity Registration |
|
|
99 | (1) |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
8.5 Use Case of Blockchain-Assisted Ride-Hailing in Vehicular Networks |
|
|
103 | (1) |
|
8.5.1 Implementation Details |
|
|
103 | (1) |
|
8.5.2 Computational Costs |
|
|
103 | (1) |
|
|
104 | (5) |
|
Part IV Future Research Directions and Discussions |
|
|
|
9 Exploring Topics in Blockchain-Enabled Internet of Things |
|
|
109 | (6) |
|
|
109 | (1) |
|
9.2 Future Research Directions |
|
|
110 | (4) |
|
9.2.1 A Further Integration |
|
|
110 | (1) |
|
|
111 | (1) |
|
9.2.3 Providing Efficient and High-Capacity Data Storage |
|
|
112 | (1) |
|
9.2.4 Enabling Data Analysis |
|
|
112 | (1) |
|
9.2.5 Enhancing Data Security and User Privacy |
|
|
113 | (1) |
|
|
114 | (1) |
|
A Setup for a Local Ethereum Platform |
|
|
115 | (6) |
|
B A Sample Examination Paper |
|
|
121 | (4) |
|
C Project 1: Blockchain for Supply Chain |
|
|
125 | (2) |
|
D Project 2: Blockchain for Collaborative Trade Management |
|
|
127 | (2) |
References |
|
129 | |