Abstract

As a large number of mobile terminals are connected to the IoT, the security problem of IoT is a challenge to the IoT technology. Blockchain technology has the characteristics of decentralization, data encryption, smart contract, and so on, especially suitable in the complex heterogeneous network. However, sequential access based on block files in the blockchain hinders efficient query processing. The problem is due to current blockchain solutions do not support temporal data processing. In this paper, we propose two index building methods (TISD and TIF) to address this issue in Hyperledger Fabric System. TISD (temporal index based on state databases) segments the historical data by time interval in the time dimension and indexes events at the same time interval. TIF (temporal index based on files) builds the index of files by the block transaction data, which is arranged in chronological order and is stored at a certain time interval. In the experimental part, we compare the query time on two datasets and analyse the query performance. Experiments demonstrated that our two methods are relatively stable in overall time performance on different datasets in the Hyperledger Fabric System.

Highlights

  • The Internet of Things is made up of devices that generate, process, and exchange large amounts of security-critical data, so IoT devices are often the target of various cyberattacks [1, 2]

  • When TISD builds indexes, it will increase the number of database accesses and the size of block files

  • Due to the GHFK function, the query time increases with the temporal query interval, while the M1 model and TISD trend basically remain stable with the temporal query interval

Read more

Summary

Introduction

The Internet of Things is made up of devices that generate, process, and exchange large amounts of security-critical data, so IoT devices are often the target of various cyberattacks [1, 2]. Due to cost constraints and harsh application scenarios, most IoT devices have general functions and limited computing and storage capabilities [3] These devices must use most of their resources for computing and executing core applications, so they cannot consume too many resources in terms of security and privacy [4]. Blockchain is an accounting technique that is maintained jointly by multiple parties and uses cryptography to ensure the security of transmission and access [5]. It can achieve consistent data storage and difficultly to tamper with and prevent denial. K, θ ε(k, θ){value(1), value(2),..., value(n)} Figure 5: TISD structure

8: Generate new θ
Related Works
13: Add events in time interval τ to Events
11: Update θ
15: Read memory
Efficient Temporal Index
Experiments and Results
Experimental Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call