Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things

In the IoT (Internet of Things) environment, smart homes, smart grids, and telematics constantly generate data with complex attributes. These data have low heterogeneity and poor interoperability, which brings difficulties to data management and value mining. The promising combination of blockchain and the Internet of things as BCoT (blockchain of things) can solve these problems. This paper introduces an innovative method DCOMB (dual combination Bloom filter) to firstly convert the computational power of bitcoin mining into the computational power of query. Furthermore, this article uses the DCOMB method to build blockchain-based IoT data query model. DCOMB can implement queries only through mining hash calculation. This model combines the data stream of the IoT with the timestamp of the blockchain, improving the interoperability of data and the versatility of the IoT database system. The experiment results show that the random reading performance of DCOMB query is higher than that of COMB (combination Bloom filter), and the error rate of DCOMB is lower. Meanwhile, both DCOMB and COMB query performance are better than MySQL (My Structured Query Language).

[1]  Jiafu Wan,et al.  A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory , 2019, IEEE Transactions on Industrial Informatics.

[2]  Tao Feng,et al.  Research on trusted DNP3-BAE protocol based on hash chain , 2018, EURASIP Journal on Wireless Communications and Networking.

[3]  Alix E. Rojas,et al.  Methodological Approach to the Definition of a Blockchain System for the Food Industry Supply Chain Traceability , 2018, ICCSA.

[4]  Md. Zakirul Alam Bhuiyan,et al.  Blockchain and Big Data to Transform the Healthcare , 2018, ICDPA 2018.

[5]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[6]  Takahiro Hara,et al.  ETC-IoT: Edge-Node-Assisted Transmitting for the Cloud-Centric Internet of Things , 2018, IEEE Network.

[7]  Ke Gu,et al.  Location Data Record Privacy Protection based on Differential Privacy Mechanism , 2018, Inf. Technol. Control..

[8]  Chien Chen,et al.  Dynamic reordering bloom filter , 2017, 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS).

[9]  MyungKeun Yoon,et al.  Bloom tree: A search tree based on Bloom filters for multiple-set membership testing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[10]  Wei Ni,et al.  Survey on blockchain for Internet of Things , 2019, Comput. Commun..

[11]  Yan Leng,et al.  Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network , 2019, Sensors.

[12]  Wenbing Wu,et al.  An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks , 2019 .

[13]  Qirun Wang,et al.  Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States , 2019 .

[14]  Arun Kumar Sangaiah,et al.  Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant , 2019, Secur. Commun. Networks.

[15]  Kim-Kwang Raymond Choo,et al.  Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.

[16]  Hong Liu,et al.  Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.

[17]  Yongjun Ren,et al.  Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage , 2018, ICCCS.

[18]  Yuansheng Luo,et al.  A Decision Function Based Smart Charging and Discharging Strategy for Electric Vehicle in Smart Grid , 2018, Mobile Networks and Applications.

[19]  Yan Leng,et al.  Secure data storage based on blockchain and coding in edge computing. , 2019, Mathematical biosciences and engineering : MBE.

[20]  Amr Tolba Content accessibility preference approach for improving service optimality in internet of vehicles , 2019, Comput. Networks.

[21]  Ali Vatankhah Barenji,et al.  A Blockchain and AutoML Approach for Open and Automated Customer Service , 2019, IEEE Transactions on Industrial Informatics.

[22]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).

[23]  Fei Yu,et al.  On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks , 2017, KSII Trans. Internet Inf. Syst..

[24]  Sai Ji,et al.  Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks , 2018, Mob. Inf. Syst..

[25]  Bin Zheng,et al.  A robust distance-based relay selection for message dissemination in vehicular network , 2018, Wireless Networks.

[26]  Amr Tolba,et al.  A Three-Tier Architecture for Securing IoV Communications Using Vehicular Dependencies , 2019, IEEE Access.

[27]  David M. Brooks,et al.  The design of a bloom filter hardware accelerator for ultra low power systems , 2009, ISLPED.

[28]  Arun Kumar Sangaiah,et al.  An empower hamilton loop based data collection algorithm with mobile agent for WSNs , 2019, Human-centric Computing and Information Sciences.

[29]  Shao Qi-feng,et al.  Blockchain : Architecture and Research Progress , 2017 .

[30]  Jun Chen,et al.  A Cluster Correlation power analysis against double blinding exponentiation , 2019, J. Inf. Secur. Appl..

[31]  David Hung-Chang Du,et al.  A Forest-structured Bloom Filter with flash memory , 2011, 2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST).

[32]  Jin Wang,et al.  Complexity and Algorithms for Superposed Data Uploading Problem in Networks With Smart Devices , 2020, IEEE Internet of Things Journal.

[33]  Yuchen Yang,et al.  Blockchain application in food supply information security , 2017, 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).

[34]  Jin Wang,et al.  A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks , 2018 .

[35]  Guido Governatori,et al.  Evaluation of Logic-Based Smart Contracts for Blockchain Systems , 2016, RuleML.

[36]  Xiwei Xu,et al.  Adaptable Blockchain-Based Systems: A Case Study for Product Traceability , 2017, IEEE Software.

[37]  Arun Kumar Sangaiah,et al.  An Energy-Efficient Off-Loading Scheme for Low Latency in Collaborative Edge Computing , 2019, IEEE Access.

[38]  Muwei Jian,et al.  A Visual Secret Sharing Scheme Based on Improved Local Binary Pattern , 2018, Int. J. Pattern Recognit. Artif. Intell..

[39]  Yongjun Ren,et al.  Digital Continuity Guarantee Based on Data Consistency in Cloud Storage , 2018, ICCCS.

[40]  Yi Mu,et al.  New Approach for Privacy-Aware Location-Based Service Communications , 2018, Wirel. Pers. Commun..

[41]  Yingchi Mao,et al.  DNN-MVL: DNN-Multi-View-Learning-Based Recover Block Missing Data in a Dam Safety Monitoring System , 2019, Sensors.

[42]  Jinyue Xia,et al.  Quantum Communication Networks and Trust Management: A Survey , 2019 .

[43]  Chunhua Su,et al.  A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine , 2020, Inf. Sci..

[44]  Zhenyu Wen,et al.  THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network , 2020, IEEE Internet of Things Journal.

[45]  Jinyue Xia,et al.  Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds , 2019, IEEE Transactions on Dependable and Secure Computing.

[46]  Marcel Antal,et al.  Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids , 2018, Sensors.

[47]  Hye-Jin Kim,et al.  An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..

[48]  Wei Liu,et al.  Energy Efficient Routing Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2019, Sensors.

[49]  Bo Yang,et al.  Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers , 2018, Inf. Sci..

[50]  Yong Wang,et al.  Traceable Threshold Proxy Signature , 2017, J. Inf. Sci. Eng..

[51]  Arun Kumar Sangaiah,et al.  An Affinity Propagation-Based Self-Adaptive Clustering Method for Wireless Sensor Networks , 2019, Sensors.

[52]  Jin Wang,et al.  An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks , 2019, Int. J. Distributed Sens. Networks.

[53]  Xuetao Wei,et al.  Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications , 2019, IEEE Internet of Things Journal.

[54]  Yan Zhang,et al.  Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy , 2019, International Journal of Theoretical Physics.