Cloud 101CircleEventsBlog

Download Publication

Using Blockchain Technology to Secure the Internet of Things
Using Blockchain Technology to Secure the Internet of Things

Using Blockchain Technology to Secure the Internet of Things

Release Date: 02/13/2018

This paper describes a high-level overview of blockchain technology and outlines a set of architectural patterns that enable blockchain to be used as a technology to secure IoT capabilities. Specific use-case examples of blockchain for IoT security are also explored, although technical implementation of those use cases will vary across companies.


Topics Covered:
  • Blockchain construction
  • Smart contracts
  • Off-chain storage solutions
  • Deployment options
  • IoT architecture based on blockchain
  • Selection of blockchain technology for IoT Security
  • Blockchain security services for the IoT
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
Best Practices for Smart Contract Security Hyperledger Fabric
Best Practices for Smart Contract Security Hype...
And now for something completely different… a Cloud Security Alliance RFI
And now for something completely different… a Cloud Security Allian...
Published: 07/01/2024
Navigating IT-OT Convergence: A Strategic Imperative for Enterprise Success
Navigating IT-OT Convergence: A Strategic Imperative for Enterprise...
Published: 07/01/2024
AI Resilience & Diversity
AI Resilience & Diversity
Published: 06/20/2024
Cloud Threats Deploying Crypto CDN
Cloud Threats Deploying Crypto CDN
Published: 06/03/2024

Acknowledgements

Kevin Fielder
Kevin Fielder
Senior Manager Cyber Security at Worldpay

Kevin Fielder

Senior Manager Cyber Security at Worldpay

Kevin Fielder has over 15 years IT and security experience across multiple industries encompassing online trading, online supermarkets, banking/finance/insurance. His various roles have included pen testing and security assessments through technical and security architecture to security consulting and innovations.

Current focus includes security strategy, secure design and development, security innovations, software based mobile secur...

Read more

Alex Brown Headshot Missing
Alex Brown

Alex Brown

Elier Cruz Headshot Missing
Elier Cruz

Elier Cruz

Doug Gardner Headshot Missing
Doug Gardner

Doug Gardner

Jas Khehra Headshot Missing
Jas Khehra

Jas Khehra

Matt Murphy Headshot Missing
Matt Murphy

Matt Murphy

Denis Nwanshi Headshot Missing
Denis Nwanshi

Denis Nwanshi

Luc Poulin Headshot Missing
Luc Poulin

Luc Poulin

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Udo Gustavo Von Blucher Headshot Missing
Udo Gustavo Von Blucher

Udo Gustavo Von Blucher

Paul Lanois Headshot Missing
Paul Lanois

Paul Lanois

Giuliana Carullo Headshot Missing
Giuliana Carullo

Giuliana Carullo

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Kendall Scoboria Headshot Missing
Kendall Scoboria

Kendall Scoboria

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Srinivas Tatipamula
Srinivas Tatipamula
Principal Security Advisor, Fairfax

Srinivas Tatipamula

Principal Security Advisor, Fairfax

C-CISO|CISSP|CISA|AWS CSS|AWS CSA|CDPSE|CISM|CGEIT|CRISC|ISO 27000LA|CCSK|ITIL-F|PMP|Bachelor of Economics (Hons)|Bachelor of Law| MS in Digital Forensics

Overall 30 plus years in IT and over 18 years in Cyber Security

Publications:

1. Cloud Security Alliance Internet of Things (IoT) Working Group IoT Security Controls Guide Version Published March 2019

2. CSA IoT Controls Matrix March 2019

3. ...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Brian Russell
Brian Russell

Brian Russell

Brian Russell is co-author of the book “Practical Internet of Things Security” and is a Chief Engineer focused on Cyber Security Solutions for Leidos (www.leidos.com). He oversees the design and development of security solutions and the implementation of privacy and trust controls for customers. Brian leads efforts that include security engineering for Unmanned Aerial Systems (UAS) and Connected Cars, and the development of hig...

Read more

Sabri Khemissa
Sabri Khemissa

Sabri Khemissa

Sabri is the ICS group cybersecurity officer a French multinational corporation that produce a variety of construction and high-performance materials. He is in charge of developing and maintaining the cybersecurity strategy, building and coordinate a cross-country and cross-business cybersecurity governance, supporting business initiatives, including strategic Smart Manufacturing and IIoT projects with a large shift to cloud services, defin...

Read more

Todd Nelson Headshot Missing
Todd Nelson

Todd Nelson

Imre Kocsis Headshot Missing
Imre Kocsis

Imre Kocsis

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training