Distributed and P2P applications are increasing day-by-day, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of the users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is promising for IoT security, affecting many areas, including manufacturing, finance, healthcare, supply chain, identity management, e-governance, defense, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption.
Blockchain for Information Security and Privacy provides essential knowledge of blockchain in mainstream areas of security, trust, and privacy in decentralized domains. The book is a source of technical information regarding blockchain-oriented software, applications. It gives tools to researchers and developers in both computing and software engineering so they can develop solutions and automated systems promoting security, trust, and privacy in cyberspace. The book features:
Blockchain based secured data management in confidential cyber defense applications Secure online voting system using blockchain Secure electronic healthcare record (EHR) management using blockchain Blockchain impact of security and privacy in digital identity management Blockchain-based security and privacy for smart contracts and smart properties
Giving an overview of blockchain technology application domains in IoT (e.g., Vehicle Web, Power Web, Cloud Internet, and Edge Computing) the book features side-by-side comparison of modern methods towards secure and privacy-preserving blockchain technology. It examines safety objectives, efficiency, limitations, computational complexity, and communication overhead, as well as presents a framework facilitating end-to-end Fog (Edge)-Cloud integration using blockchain. The book also addresses the combination of blockchain and Industrial IoT and explores novel various levelled information sharing systems where two sorts of sub-blockchain are framed considering adaptable access control.