Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review
Abstract
:1. Introduction
2. Related Work
3. Blockchain Technology
- Ledger. It is the information storage structure: a distributed ledger. This means that all participating members of the blockchain have an identical copy of this distributed database.
- Consensus Protocols. Each time a new block is introduced in the network, it needs to be validated by a majority of members belonging to the blockchain network and this is achieved through the consensus protocols. Among the best known are Proof of Work (PoW), Proof of Stake (PoS), Delegate Proof of Stake (DPoS), Practical Byzantine Fault Tolerance (PBFT), Leased Proof-of-Stake (LPoS), Proof-of-Elapsed-Time (PoET), Proof-of-Activity (PoA), Proof-of-Importance (PoI), Proof-of-Capacity (PoC), Proof-of-Burn (PoB) and Proof-of-Weight (PoW).
- Miners. These are the network nodes that create the new blocks. To do this they have to solve a complex cryptographic problem that requires a lot of computing power, the node that first solves the challenge is responsible for creating the new block and therefore receives a reward.
- Public Key Infrastructure (PKI). This type of cryptography makes it possible not only to uniquely identify the participating nodes of the blockchain network and facilitate communication between them through public–private keys, but also to identify blocks and transactions in a secure and unrepeatable way in the system. Hash functions (e.g., SHA-256) are used to validate the content of each block within the chain.
- Nodes. Network of nodes that make up the entire blockchain network and between which there is communication, exchanging data, transactions, adding new blocks or validating transactions.
- –
- Inmutability. Once a transaction is validated, it becomes permanent and cannot be changed.
- –
- Availability. Being based on a distributed database means high availability.
- –
- Integrity. The application of cryptographic functions to validate a transaction increases the level of integrity of the information and prevents the inclusion of corrupted information, in which case the block would be rejected because the content cannot be verified with the stored hash functions. Moreover, when each block maintains a reference to its predecessor, including the result of the hash function of the same, which allows us to perform the validation of the whole chain.
- –
- Transparency. The fact that all transactions are stored in the ledger and that any transaction can be traced is particularly attractive for many fields of application.
- –
- Auditability. There is a record of sufficient information about the transactions to leads to any verification of the transactions and their veracity.
- –
- Fault tolerance. Characteristic related to the concept of decentralisation added to the consensus mechanisms that validate transactions.
- –
- Consistency. The decentralised design of the Ledger and the application of cryptographic functions makes it possible for the information stored in the chain to be preserved permanently and without the possibility of modifying it without being detected.
- –
- Privacy. The identity of those involved in a transaction is protected by cryptographic functions, a concept related to the capacity of anonymity in blockchain.
- –
- Anonymity. Pseudomisation or anonymisation, as appropriate, is provided by cryptographic functions so that the true identity of the participants in the blockchain is not known. This is made possible through the use of public–private key cryptography.
4. Research Methodology
4.1. Identification of the Investigation
- Q1. How does blockchain use anonymity to guarantee privacy?
- Q2. What are the disadvantages of blockchain to adapt to the GDPR?
- Q3. How were the problems encountered addressed?
- Q4. Proposals for future research offered by the publications.
4.2. Develop Review Protocol
4.3. Conduct Searches
4.4. Selection of Publications
4.5. Assess Studies
4.6. Performing Snowballing
4.7. Data Extraction and Synthesis
5. Analysis of Results
5.1. Analysis of Results on Application Domains
- Health field. Where new challenges, security and privacy requirements [7] must be addressed for successful large-scale data exchange. Health information needs to have adequate privacy. When blockchain is used to store health data, a public key is associated with the individual’s identity in order to protect his or her true identity through a pseudonym. There is a risk of re-identification through public data in the blockchain which would allow the true identity of the individual to be known, which is a serious problem. In addition, there is the possibility that different records may be accessible to different health professionals, which is difficult to achieve through a blockchain and would need to be implemented. Another aspect to consider is the right to forget that the GDPR incorporates and which would not be compatible with the functioning of a blockchain, given its permanent nature.
- IoT. The blockchain technology has revolutionised the IoT [31,49] with its efficiency and scalability, although it tries to give solution to the way in which the different devices that intervene are related creating an environment of reliability and security as well as the transfer of information between devices in a reliable way; however, there are unresolved limitations to improving the scalability of IoT devices [52]; this is being approached from a new perspective of distributed ledger under the IOTA project. The work in [33] highlights the need to develop a standard for sharing IoT data sets in order to take advantage of the blockchain potential to facilitate the safe exchange of data as well as to secure the IoT system itself. One of the most important problems to be solved [8,49] would be device impersonation, false authentication or unreliability that could occur in the data exchange. This can be a security breach, which is a prerequisite for implementing privacy.
- Big Data. The approach taken in this area [23,45,47] with respect to the use of blockchain technology is to increase the level of confidentiality, especially of the information being shared. The fact of storing large amounts of information and combining this with blockchain technology presents the disadvantage of the capacity that can support each transaction, so storage off-chain appears as a solution, which in turn raises issues such as security and data privacy.
- Storage of information. The authors of [34] opt for the feature offered by the blockchain technology of inherent immutability that ensures resistance to modification or deletion of stored data and aims to increase the level of privacy. It opens the possibility to a blockchain in the future that can modify or delete transactions in a secure way, maintaining the anonymity of the identities involved. For this it proposes an optimised and flexible memory on blockchain. This proposal makes it possible to comply with the right to be forgotten, which is required by the GDPR and which up to now blockchain does not allow.
- Ad hoc vehicular network. In this case [36], where vehicles are used as nodes in a network, the focus is on trust and privacy, as they remain open issues, and it is crucial to prevent vehicles from sending false messages while preserving privacy from the different types of possible attacks. The work in [43], researchers focus attention on the communication between vehicles and devices of the environment, of the smart city, is the Internet of the Vehicles (IoV). Communications should be anonymous to preserve the privacy of the vehicles but, on the other hand, this anonymity is needed to ensure that the authorities are able to obtain information from them in the event of a dispute. To achieve this, a blockchain-based anonymous reputation system (BARS) is proposed in which a certification authority (CA), law enforcement authority (LEA), roadside unit (RSU) as well as the vehicles are defined as model components. In this model, CA and LEA are responsible for initialising the system, updating certificates and revoking public keys. In this case the public keys act as a pseudonym to preserve the identity of the vehicles.
- Business. In this field, several companies have opted for the implementation of blockchain technology [37] as a solution to problems such as traceability, transparency, auditing and other possible applications yet to be explored. The use of blockchain in the business environment is still at a very early stage and needs to be thoroughly investigated. Smart contracts, together with consensus protocols, provide a new way of developing business processes.
- Industry 4.0. In the field of industry [24,52], blockchain has been chosen as a way of providing guarantees of privacy and security, as well as the anonymous authentication of devices, the capacity to audit industrial processes and the confidentiality of the data processed. A notable feature of blockchain technology that is particularly attractive for this field of action would be the possibility of scaling it. In the processes involved in the industry, a wide variety of devices and sensors interact collecting all kinds of data, such as temperature, distance, size, humidity, luminosity or movement, making it necessary to store and process it safely. There is communication between sensors and devices, which should be traced and, if necessary, audited.
- Cryptocurrencies. Although in this research we have avoided entering into the different cryptographic currencies that are supported by blockchain technology, which is the field where blockchain has been most widely used, it is more than notable that one of the star applications of this technology is the management of cryptocurrencies. There are currently many types of cryptocurrencies, and it should be noted that there are certain projects, such as ALASTRIA [20], which aim to integrate different banks and provide banking interoperability through blockchain. On the other hand, we find ETHEREUM [21] which provides other uses and applications for blockchain technology in addition to cryptocurrencies. Cryptocurrency technology is used for other purposes, such as smart contracts [45] and providing them with the necessary privacy and anonymity.
5.2. Analysis of Results on the Issues Raised
6. Discussion
7. Conclusions
8. Future Work
Author Contributions
Funding
Conflicts of Interest
References
- EUGDPR-Information Portal. Available online: https://www.eugdpr.org (accessed on 27 November 2019).
- Tikkinen-Piri, C.; Rohunen, A.; Markkula, J. EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Comput. Law Secur. Rev. 2018, 34, 134–153. [Google Scholar] [CrossRef] [Green Version]
- CENTRO CRIPTOLÓGICO NACIONAL: Guía de Seguridad de las TIC CCN-STIC 817. Esquema Nacional de Seguridad. Gestión de ciberincidentes. Ministerio de Defensa del Gobierno de España, 2020. Available online: https://www.ccn-cert.cni.es/series-ccn-stic/800-guia-esquema-nacional-de-seguridad/988-ccn-stic-817-gestion-de-ciberincidentes/file.html (accessed on 15 September 2020).
- ISO 27035 Information Security Incident Management. Available online: https://www.iso27001security.com/html/27035.html (accessed on 15 September 2020).
- Pfitzmann, A.; Hansen, M. A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. Available online: https://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.32.pdf (accessed on 15 September 2020).
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 15 September 2020).
- Gordon, W.J.; Catalini, C. Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability. Comput. Struct. Biotechnol. J. 2018, 16, 224–230. [Google Scholar] [CrossRef] [PubMed]
- Manoj Kumar, N.; Kumar Mallick, P. Blockchain technology for security issues and challenges in IoT. Procedia Comput. Sci. 2018, 132, 1815–1823. [Google Scholar] [CrossRef]
- Efanov, D.; Roschin, P. The All-Pervasiveness of the Blockchain Technology. Procedia Comput. Sci. 2018, 123, 116–121. [Google Scholar] [CrossRef]
- Bernal Bernabe, J.; Canovas, J.L.; Hernandez-Ramos, J.L.; Torres Moreno, R.; Skarmeta, A. Privacy-Preserving Solutions for Blockchain: Review and Challenges. IEEE Access 2019, 7, 164908–164940. [Google Scholar] [CrossRef]
- Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat. Inform. 2019, 36, 55–81. [Google Scholar] [CrossRef]
- Thomas, M.; Chooralil, V. Security and Privacy via Optimised Blockchain. Int. J. Adv. Trends Comput. Sci. Eng. 2019, 8, 415–418. [Google Scholar] [CrossRef]
- Jin, H.; Luo, Y.; Li, P.; Mathew, J. A Review of Secure and Privacy-Preserving Medical Data Sharing. IEEE Access 2019, 61656–61669. [Google Scholar] [CrossRef]
- Monrat, A.A.; Schelen, O.; Andersson, K. A Survey of Blockchain From the Perspectives of Applications, Challenges, and Opportunities. IEEE Access 2019, 7, 117134–117151. [Google Scholar] [CrossRef]
- Fernandez-Carames, T.M.; Fraga-Lamas, P. A Review on the Use of Blockchain for the Internet of Things. IEEE Access 2018, 6, 32979–33001. [Google Scholar] [CrossRef]
- Yao, H.; Mai, T.; Wang, J.; Ji, Z.; Jiang, C.; Qian, Y. Resource Trading in Blockchain-Based Industrial Internet of Things. IEEE Trans. Ind. Inform. 2019, 15, 3602–3609. [Google Scholar] [CrossRef]
- Fan, K.; Bao, Z.; Liu, M.; Vasilakos, A.V.; Shi, W. Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT. Future Gener. Comput. Syst. 2020, 110, 665–674. [Google Scholar] [CrossRef]
- Jangirala, S.; Das, A.K.; Vasilakos, A.V. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Trans. Ind. Inform. 2020, 16, 7081–7093. [Google Scholar] [CrossRef]
- Bera, B.; Saha, S.; Das, A.K.; Vasilakos, A.V. Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System. IEEE Internet Things J. 2020. [Google Scholar] [CrossRef]
- ALASTRIA. Available online: https://alastria.io (accessed on 15 September 2020).
- ETHEREUM. Available online: https://www.ethereum.org/ (accessed on 15 September 2020).
- Francesco Maesa, D.; Mori, P. Blockchain 3.0 applications survey. J. Parallel Distrib. Comput. 2020, 138, 99–114. [Google Scholar] [CrossRef]
- Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
- Lin, C.; He, D.; Huang, X.; Raymond Choo, K.; Vasilakos, A.V. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 2018, 116, 42–52. [Google Scholar] [CrossRef]
- Yang, J.; Lu, Z.; Wu, J. Smart-toy-edge-computing-oriented data exchange based on blockchain. J. Syst. Archit. 2018, 87, 36–48. [Google Scholar] [CrossRef]
- Lai, R.; Kuo, L.E.E.; Chuen, D. Handbook of Blockchain, Digital Finance, and Inclusion; Singapore University of Social Sciences: Singapore, 2018; Volume 2, pp. 145–177. [Google Scholar]
- Mohsin, A.H.; Zaidan, A.A.; Zaidan, B.B.; Albahri, O.S.; Albahri, A.S.; Alsalem, M.A.; Mohammed, K.I. Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions. Comput. Stand. Interfaces 2018, 64, 41–60. [Google Scholar] [CrossRef]
- Kitchenham, B. Procedures for Performing Systematic Reviews; National ICT Australia Ltd.: Keele, UK, 2004. [Google Scholar]
- Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; EBSE Technical Report EBSE-2007-01 Version 2.3; University of Durham: Durham, UK, 2007. [Google Scholar]
- ICO. Guide to the General Data Protection Regulation (GDPR). 2018. Available online: https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/ (accessed on 27 November 2019).
- Eddine Kouicem, D.; Bouabdallah, A.; Hicham, L. Internet of things security: A top-down survey. Comput. Netw. 2018, 141, 199–221. [Google Scholar] [CrossRef] [Green Version]
- Hammi, M.T.; Hammi, B.; Bellot, P.; Serhrouchni, A. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur. 2018, 78, 126–142. [Google Scholar] [CrossRef]
- Banerjee, M.; Lee, J.; Raymond Choo, K. A blockchain future for internet of things security: A position paper. Digit. Commun. Netw. 2018, 4, 149–160. [Google Scholar] [CrossRef]
- Dorri, A.; Kanhere, S.; Jurdak, R. MOF-BC: A memory optimized and flexible blockchain for large scale networks. Future Gener. Comput. Syst. 2017, 92, 357–373. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; Li, M.; He, Y.; Li, H.; Xiao, K.; Wang, C. A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications. IEEE Access 2018, 6, 17545–17556. [Google Scholar] [CrossRef]
- Lu, Z.; Liu, W.; Wang, Q.; Qu, G.; Liu, Z. A Privacy-Preserving Trust Model Based on Blockchain for VANETs. IEEE Access 2018, 6, 45655–45664. [Google Scholar] [CrossRef]
- Viriyasitavat, W.; Hoonsopon, D. Blockchain characteristics and consensus in modern business processes. J. Ind. Inf. Integr. 2019, 13, 32–39. [Google Scholar] [CrossRef]
- García, M.; Dubey, A.; Botti, V. Introducing the new paradigm of Social Dispersed Computing: Applications, Technologies and Challenges. J. Syst. Archit. 2018, 91, 83–102. [Google Scholar] [CrossRef]
- Wang, B.; Sun, J.; He, Y.; Pang, D.; Lu, N. Large-scale Election Based On Blockchain. Procedia Comput. Sci. 2018, 129, 234–237. [Google Scholar] [CrossRef]
- Feng, Q.; He, D.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 2019, 126, 45–58. [Google Scholar] [CrossRef]
- Li, X.; Mei, Y.; Gong, J.; Xiang, F.; Sun, Z. A Blockchain Privacy Protection Scheme Based on Ring Signature. IEEE Access 2020, 8, 76765–76772. [Google Scholar] [CrossRef]
- Wang, Q.; Huang, J.; Wang, S.; Chen, Y.; Zhang, P.; He, L. A Comparative Study of Blockchain Consensus Algorithms. J. Phys. Conf. Ser. 2020, 1437, 012007. [Google Scholar] [CrossRef]
- Xu, C.; Liu, H.; Li, P.; Wang, P. A Remote Attestation Security Model Based on Privacy-Preserving Blockchain for V2X. IEEE Access 2018, 6, 67809–67818. [Google Scholar] [CrossRef]
- Joo, L.Y.; Myung, L.K. Blockchain-based Multi-Purpose Authentication Method for Anonymity and Privacy. Int. J. Recent Technol. Eng. (IJRTE) 2019, 8, 409–414. [Google Scholar] [CrossRef]
- Wu, Y.; Tang, S.; Zhao, B.; Peng, Z. BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing. IEEE Access 2019, 7, 45605–45617. [Google Scholar] [CrossRef]
- Lee, Y.; Myung Lee, K. Blockchain-based RBAC for user authentication with anonymity. In Proceedings of the Conference on Research in Adaptive and Convergent Systems (RACS ’19), Chongqing, China, 24–27 September 2019; Association for Computing Machinery: New York, NY, USA; pp. 289–294. [Google Scholar] [CrossRef]
- Jo, H.J.; Choi, W. BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems. PLoS ONE 2019, 14, e0225688. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Noh, J.; Jeon, S.; Cho, S. Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles. Electronics 2020, 9, 74. [Google Scholar] [CrossRef] [Green Version]
- Sultan, A.; Mushtaq, M.A.; Abubakar, M. IOT Security Issues Via Blockchain: A Review Paper. In Proceedings of the 2019 International Conference on Blockchain Technology, Honolulu, HI, USA, 15–18 March 2019; pp. 60–65. [Google Scholar] [CrossRef]
- Zou, S.; Xi, J.; Wang, S.; Lu, Y.; Xu, G. Reportcoin: A Novel Blockchain-Based Incentive Anonymous Reporting System. IEEE Access 2019, 7, 65544–65559. [Google Scholar] [CrossRef]
- Zhang, R.; Xue, R.; Liu, L. Security and Privacy on Blockchain. ACM Comput. Surv. 2019, 52, 1–34. [Google Scholar] [CrossRef] [Green Version]
- Rathore, H.; Mohamed, A.; Guizani, M. A Survey of Blockchain Enabled Cyber-Physical Systems. Sensors 2020, 20, 282. [Google Scholar] [CrossRef] [Green Version]
- FinTech Observatorio Finanzas y Tecnología. Available online: https://www.fin-tech.es/2016/10/corda-la-plataforma-blockchain-codigo-abierto.html (accessed on 15 September 2020).
- Sweeney, L. k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowlege-Based Syst. 2002, 10, 557–570. [Google Scholar] [CrossRef] [Green Version]
Database | Search String |
---|---|
Google Scholar | blockchain privacy anonymity -bitcoin [interval 2016–2020] |
ACM Digital Library | [All: blockchain] AND [All: privacy] AND [All: anonymity] AND [All: not bitcoin] AND [Publication Date: (01/01/2016 TO *)] |
Springer | blockchain AND privacy AND anonymity AND NOT (bitcoin) within 2016–2020 |
IEEE Xplore Digital Library | ((((blockchain) AND privacy) AND anonymity) NOT bitcoin) Filters Applied: 2016–2020 |
Science Direct | blockchain privacy anonymity -bitcoin Years: 2016–2020 |
Scopus | TITLE-ABS-KEY (“blockchain” AND “privacy” AND “anonymity” AND NOT “bitcoin”) AND PUBYEAR > 2015 AND PUBYEAR <= 2020 |
Relevant Journals | Publishers |
---|---|
ACM Computing Surveys | ACM |
Applied Sciences | MDPI |
Computation and Structural Biotechnology Journal | Elsevier |
Computer Networks | Elsevier |
Computer & Security | Elsevier |
Computer Standards & Interfaces | Elsevier |
Digital Communications and Networks | KeAi Chinese Roots, Global Impact |
Electronics | MDPI |
International Journal of Recent Technology and Engineering | Blue Eyes Intelligence Engineering & Sciences Publication |
Future Generation Computer Systems | Elsevier |
IEEE Access | IEEE |
Journal of Industrial Information Integration | Elsevier |
Journal of Network and Computer Applications | Elsevier |
Journal of System Architecture | Elsevier |
Procedia Computer Science | Elsevier |
Sensors | MDPI |
PLoS ONE | PLos ONE |
Reference | Citations | Authors | Name of Contribution |
---|---|---|---|
[7] | 104 | Gordon, W.J. and Catalini, C. | Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability |
[31] | 111 | Eddine Kouicem, D.; Bouabdallah, A. and Lakhlef, H. | Internet of things security: A top-down survey |
[32] | 112 | Hammi, M.T.; Hammi, B.; Bellot, P. and Serhrouchni, A. | Security & Bubbles of Trust: A decentralized blockchain-based authentication system for IoT |
[33] | 117 | Banerjee, M.; Lee J. and Raymond Choo, K. | A blockchain future for internet of things security: a position paper |
[23] | 322 | Reyna, A.; Martín, C.; Chen, J.; Soler, E. and Díaz, M. | On blockchain and its integration with IoT. Challenges and opportunities |
[34] | 26 | Dorri, A.; Kanhere, S. and Jurdak, R. | MOF-BC: A memory optimized and flexible blockchain for large scale networks |
[26] | - | Lai, R. and LEE Kuo Chuen, D. | Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2. Chapter 7 - Blockchain From Public to Private |
[35] | 81 | Wang, J.; Li, M.; He, Y.; Li, H.; Xiao, K. and Wang, C. | A Blockchain Based Privacy-Preserving incentive Mechanism in Crowdsensing Applications |
[36] | 63 | Lu, Z.; Liu, W.; Wang, Q.; Qu, G. and Liu, Z. | A Privacy-Preserving Trust Model Based on Blockchain for VANETs |
[37] | 53 | Viriyasitavat, W. and Hoonsopon, D. | Blockchain characteristics and consensus in modern business processes |
[24] | 93 | Lin, C.; He, D.; Huang, X.; Raymond Choo, K. and Vasilakos, A.V. | BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 |
[38] | 20 | García, M.; Dubey, A. and Botti, V. | Introducing the new paradigm of Social Dispersed Computing: Applications, Technologies and Challenges |
[25] | 25 | Yang, J.; Lu, Z. and Wu, J. | Smart-toy-edge-computing-oriented data exchange based on blockchain |
[8] | 79 | Manoj Kumar, N. and Kumar Mallick, P.B. | Blockchain technology for security issues and challenges in IoT |
[9] | 46 | Efanov, D. and Roschin, P. | The All-Pervasiveness of the Blockchain Technology |
[39] | 27 | Wang, B.; Sun, J.; He. Y.; Pang, D. and Lu, N. | Large-scale Election Based On Blockchain |
[40] | 83 | Feng, Q.; He, D.; Zeadally, S.; Khan, M.K. and Kumar, N. | A Survey on privacy protection in blockchain system |
[41] | 2 | Li, X.; Mei, Y., Gong, J.; Xiang, F. and Sun, Z. | A Blockchain Privacy Protection Scheme Based on Ring Signature |
[42] | - | Wang, Q.; Huang, J.; Wang, S.; Chen, Y.; Zhang, P. and He, L. | A Comparative of Blockchain Consensus Algorithms |
[43] | 15 | Xu, C.; Liu, H.;Li, P. and Wang, P. | A Remote Attestation Security Model Based on Privacy-Preserving Blockchain for V2X |
[44] | - | Joo Lee, Y. and Myung Lee, K. | Blockchain-based Multi-Purpose Authentication Method for Anonymity and Privacy |
[45] | 8 | Wu, Y.; Tang, S.; Zhao, B. and Peng, Z. | BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing |
[46] | 2 | Lee, Y. and Myung Lee, K. | Blockchain-based RBAC for User Authentication with Anonymity |
[47] | - | Jo, H.J. and Choi, W. | BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems |
[48] | 3 | Noh, J.; Jeon, S.; Cho, S. | Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles |
[49] | 3 | Sultan, A.; Mushtaq, M.A. and Abubakar, M. | IOT Security Issues Via Blockchain: A Review Paper |
[50] | 1 | Zou, S.; Xi, J.; Wang, S.; Lu, Y. and Xu, G. | Reportcoin: A Novel Blockchain-Based Incentive Anonymous Reporting System |
[51] | 39 | Zhang, R.; Xue, R. and Liu, L. | Security and Privacy on Blockhain |
Application Area | Related Studies |
---|---|
IoT | [8,23,24,25,31,32,33,34,36,38,49] |
Health | [7] |
Cloud | [23] |
Big Data | [23] |
Smartphones | [35,45,47,50] |
Vehicles | [36,43,48] |
Business Process Management | [37] |
Industry 4.0 | [24] |
Electronic voting | [39] |
General application | [9,26,40,41,42,44,46,51] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
de Haro-Olmo, F.J.; Varela-Vaca, Á.J.; Álvarez-Bermejo, J.A. Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review. Sensors 2020, 20, 7171. https://doi.org/10.3390/s20247171
de Haro-Olmo FJ, Varela-Vaca ÁJ, Álvarez-Bermejo JA. Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review. Sensors. 2020; 20(24):7171. https://doi.org/10.3390/s20247171
Chicago/Turabian Stylede Haro-Olmo, Francisco José, Ángel Jesús Varela-Vaca, and José Antonio Álvarez-Bermejo. 2020. "Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review" Sensors 20, no. 24: 7171. https://doi.org/10.3390/s20247171
APA Stylede Haro-Olmo, F. J., Varela-Vaca, Á. J., & Álvarez-Bermejo, J. A. (2020). Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review. Sensors, 20(24), 7171. https://doi.org/10.3390/s20247171