Abstract
In typical Internet of Things (IoT) networks, data is sent from sensors to fog devices and then onto a central cloud server. One single point of failure, a slowdown in the flow of data, identification, security, connection, privacy concerns caused by a third party managing cloud servers, and the difficulty of frequently updating the firmware on millions of smart devices from both a maintenance and a security point of view are just some of the problems that can occur. The evolution of ubiquitous computing and blockchain technology has inspired researchers worldwide in recent years. Key features of blockchain technology, such as the fact that it can't be changed and a decentralised and distributed approach to data security, have made it a popular choice for developing diverse applications. With the practically significant applicability of blockchain concepts (specifically consensus methods), modern-day applications in ubiquitous computing and other related areas have significantly benefited. In addition, we have taken advantage of the widely available blockchain platforms and looked into potential new study fields. As a result, this review paper elaborates the novel alternative privacy preservation options while simultaneously focusing on the universal domain as a starting point for blockchain technology applications. We also discuss obstacles, research gaps, and solutions. This review can assist early researchers who are beginning to investigate the applicability of blockchain technology in ubiquitous computing. It is also possible to use it as a reference in order to speed up the process of finding the appropriate markers for ongoing research subjects that are of interest.
Graphical Abstract
[http://dx.doi.org/10.1109/ICALT.2017.37]
[http://dx.doi.org/10.1109/SmartWorld.2018.00081]
[http://dx.doi.org/10.53730/ijhs.v6n7.10692]
[http://dx.doi.org/10.1109/JIOT.2019.2911969]
[http://dx.doi.org/10.3390/su12219179]
[http://dx.doi.org/10.1109/ICDE51399.2021.00165]
[http://dx.doi.org/10.1109/ACCESS.2018.2842685]
[http://dx.doi.org/10.48550/arXiv.2109.03184]
[http://dx.doi.org/10.3390/jsan8010015]
[http://dx.doi.org/10.3390/app112211011]
[http://dx.doi.org/10.1007/s12083-021-01207-1]
[http://dx.doi.org/10.1007/978-981-15-5345-5_3]
[http://dx.doi.org/10.5210/fm.v24i9.9700]
[http://dx.doi.org/10.1007/978-3-030-23813-1]
[http://dx.doi.org/10.1109/CCAA.2015.7148502]
[http://dx.doi.org/10.1007/978-981-16-6460-1_8]
[http://dx.doi.org/10.1145/3459087]
[http://dx.doi.org/10.1145/3376044.3376065]
[http://dx.doi.org/10.1016/j.bcra.2021.100006]
[http://dx.doi.org/10.3390/s18082575] [PMID: 30082633]
[http://dx.doi.org/10.1016/j.compeleceng.2019.106525]
[http://dx.doi.org/10.1145/3301403.3301407]
[http://dx.doi.org/10.1109/ACCESS.2018.2890507]
[http://dx.doi.org/10.1109/TPDS.2019.2900238]
[http://dx.doi.org/10.3390/s21020359] [PMID: 33430274]
[http://dx.doi.org/10.1109/ACCESS.2019.2913682]
[http://dx.doi.org/10.1109/JIOT.2019.2892009]
[http://dx.doi.org/10.1109/TII.2019.2903342]
[http://dx.doi.org/10.1109/TSP.2019.8769060]
[http://dx.doi.org/10.1109/MWC.2017.1800116]
[http://dx.doi.org/10.1109/ACCESS.2019.2956748]
[http://dx.doi.org/10.1109/ACCESS.2020.2988579]
[http://dx.doi.org/10.1080/00207543.2020.1754487]
[http://dx.doi.org/10.1109/ICTC.2018.8539529]
[http://dx.doi.org/10.1109/TVT.2019.2894944]
[http://dx.doi.org/10.1109/VTCFall.2017.8288286]
[http://dx.doi.org/10.1016/j.jnca.2017.10.017]
[http://dx.doi.org/10.1145/3190508.3190538]
[http://dx.doi.org/10.1109/MCOM.2017.1600267CM]
[http://dx.doi.org/10.1109/ACCESS.2018.2853985]
[http://dx.doi.org/10.1016/j.cose.2019.101653]
[http://dx.doi.org/10.1016/j.jnca.2018.10.019]