Access 2019 2961372
Access 2019 2961372
Access 2019 2961372
fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.DOI
ABSTRACT In recent years, the emergence of blockchain technology (BT) has become a unique, most
disruptive, and trending technology. The decentralized database in BT emphasizes data security and privacy.
Also, the consensus mechanism in it makes sure that data is secured and legitimate. Still, it raises new
security issues such as majority attack and double-spending. To handle the aforementioned issues, data
analytics is required on blockchain based secure data. Analytics on these data raises the importance of arisen
technology Machine Learning (ML). ML involves the rational amount of data to make precise decisions.
Data reliability and its sharing are very crucial in ML to improve the accuracy of results. The combination
of these two technologies (ML and BT) can provide highly precise results. In this paper, we present a
detailed study on ML adoption for making BT-based smart applications more resilient against attacks.
There are various traditional ML techniques, for instance, Support Vector Machines (SVM), clustering,
bagging, and Deep Learning (DL) algorithms such as Convolutional Neural Network (CNN) and Long
short-term memory (LSTM) can be used to analyses the attacks on a blockchain-based network. Further, we
include how both the technologies can be combined in several smart applications such as Unmanned Aerial
Vehicle (UAV), Smart Grid (SG), healthcare, and smart cities. Then, future research issues and challenges
are explored. At last, a case study is presented with a detailed conclusion.
INDEX TERMS Blockchain, Machine Learning, Smart Grid, Data Security and Privacy, Data Analytics,
Smart Applications
VOLUME 4, 2016 1
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
attacks (51% attack) that control voting, Sybil attacks for fake blockchain. The proposed survey covers all the fundamental
identity generation to control the consensus [5]. To handle the aspects of ML to be applied BT based applications, for
aforementioned issue, a robust Intrusion Detection System instance, intrusion detection. A review conducted by Meng
(IDS) is required in place because the traditional methods use et al. [12] describes how blockchain help to meet intrusion
a signature-based approach to detect specific patterns. But, detection. The authors mitigate trust issues by establishing a
to detect intrusions and attack patterns, one of the emerging collaborative IDS using smart contracts [17]. Further, Conti
technology known as ML can be used to analyze the data et al. [13] surveyed on security and privacy issues of bitcoin.
traffic. Thus, designing efficient and effective algorithms They discuss various categories of attacks, such as double-
to analyze this massive amount of data is in dire need of spending attacks, client-side security threats, and mining
handling the blockchain-based smart applications. Hence, pool attacks. To handle the aforementioned issue, Rahouti et
ML is highly prevalent today and uses a dozen times a al. [5] discuss specific ML-based solutions and discuss the
day without even realizing it. ML encompasses computers handling of specific social issues such as human trafficking
to study, think, and act without intervention of humans. and drug sales through cryptocurrency. Then, Ucci et al [14]
It is considered to be one of the applications of Artificial explored malware analysis using ML techniques. Features of
Intelligence (AI). ML provides computers the competency to malware were thoroughly discussed, and a detailed taxonomy
learn without being programmed it explicitly. Its basic idea has been proposed. Salah et al. [15] and Casino et al. [16]
is to build an efficient algorithm that can accept input data conducted a review on blockchain-based applications. To
and, with the help of statistical analysis, make a prediction, clarify the main difference between other surveys paper and
and update the outputs. A substantial amount of data can be this survey paper, a comprehensive comparison has been
analyzed by ML to create data-driven decisions. shown in Table 1. It includes objectives, merits, and demerits
In a communication network of blockchain-based smart of peer surveys concerning numerous parameters such as
applications, there is layer-wise handling of security issues. architecture, applications, open issues, taxonomy, and merits,
Some security issues are handled at the network layer, such as demerits of the existing approaches. A master taxonomy of
malicious packets and some at the application layer such as ML for BT is summarized in Figure 3.
malware [6]. At the network layer, malicious packets can be
used to impose the network to establish fraudulent consensus. B. RESEARCH CONTRIBUTIONS
A naive solution to this problem can be to use a firewall
Though several research works exist to address the various
to ensure that packets meet pre-defined security criteria [7].
ML usages for the blockchain-based system but It has not
Though, the attacks are becoming more sophisticated with
been exploited to its full potential. In this paper, we investi-
unseen patterns to bypass a firewall. To prevent this issue,
gated the ML usages for BT. The following are the research
packets header data can be analyzed using ML models [8] in
contribution of this paper.
real-time using historical data. This analysis helps to detect
new and changing patterns. Similarly, ML techniques can • A brief discussion on how ML and blockchain can be
be used to classify malware to end-point such as servers, used together with a proposed architecture diagram.
mobile, or workstations. Further, several blockchain-based • To develop taxonomy covering ML techniques required
smart applications such as UAV [9], Data Trading [10], SG for BT based environment. In each part of the taxonomy,
build trust between data exchangers [11]. It is very crucial existing work has been discussed in detailed to handle
in any smart application at the same time; data should be several issues, such as preventing and predicting attacks
secure. BT ensures data security but to build confidence, on the blockchain network.
and ML techniques are used to predict untrustworthy nodes • A case study is presented to demonstrate the ML tech-
based on past patterns. Similarly, UAVs have significantly niques for blockchain-based smart applications, for ex-
different network topology compared to the conventional ample, SG.
blockchain network topology [9]. It includes communication
using satellites and various ground stations. For UAV, BT is C. ORGANIZATION
used to securely store coordinates and other relevant data to
maintaining graph integrity for the vehicles. In subsequent The rest of the paper organized as follows: Section 2 provides
sections, we explore the recent research work on ML adop- a background of Blockchain, ML, and list all benefits while
tion in the blockchain-based smart application. applying ML for BT based application. Then, we proposed an
architecture. Survey procedures and taxonomy presented in
Section 3. Then, in Section 4-7, we present existing advance-
A. SCOPE OF THIS SURVEY ments in ML approaches for BT-based smart applications.
Several survey work has been published till date by the A discussion on future research issues and challenges is
different researchers on the various aspects of the adoption presented in Section 8. Further, section 9 covers a case study
of ML in blockchain-based smart applications [5]. As per on the SG system, and finally, we concluded the paper.
our knowledge, most of the surveys have focused on specific
areas, fields, or applications where it requires both ML and II. BACKGROUND
2 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
4 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
III. SURVEY PROCEDURES AND TAXONOMY CIDS can be addressed with the use of ML classifiers on
In this section, we refer to the procedures used to perform this BT. These classifiers run locally by the data owner, and
study; for example, our search approach and inclusion criteria the results shared with other users within the network. To
for the final set of papers. Likewise, we present a detailed handle the trust computation issue in CIDS, Alexopoulos
taxonomy based on our literature review. et al. [29] proposed an approach to handle the alerts and
data distribution among the participants. Then, it verifies the
A. SYSTEMATIC LITERATURE REVIEW data and executes a suitable consensus algorithm to add a
We used standard databases (for example IEEEXplore, ACM new data block within the blockchain network. These data
Digital Library, ScienceDirect, and Springerlink) and Google alerts could be encrypted with keys distributed to selected
Scholar to search existing research work, using keywords parties. Another approach was to keep them on a separate
such as âĂIJMachine Learning for Blockchain-based Smart blockchain while still being part of the network. Further, an
Application,âĂİ (âĂIJBlockchain for Smart ApplicationsâĂİ anomaly detection system (ADS) was implemented based on
AND âĂIJMachine Learning for Smart applicationsâĂİ ). the assumption that a similar kind of attack may occur, but on
In the initial phase, publications emphasis essentially on different nodes in the blockchain network [32]. This system
blockchain approaches for smart applications. Then, in the does not discard information about orphans and forks that
next phase of the search, we concentrated on an ML-based are usually done by other ADS. The attacked nodes shared
solution for blockchain-based smart applications. Based on this information with other neighborâĂŹs node within the
the results of these searches, we removed duplicate articles network. In the experimental analysis, the system success-
and obtained our first set of more than 350 publications. fully prevented the same kind of attack (on other nodes) with
Further, we steered the search procedure with several maga- negligible overhead.
zines, journals, and conferences dedicated to the parent field,
ML, smart applications, and Blockchain. Based on that, we B. MONITORING
found 130 articles. Then, we studied the different sections A blockchain monitoring system has been prototyped using
of the articles like abstract, conclusion, and introduction. Self Organising Maps (SOMs) [33]. It has modeled the
Then we categorized these articles as âĂIJrelevantâĂİ or dataset without external control. Here, large vectors map
non-relevantâĂİ to ML for blockchain-based smart applica- to smaller and lower dimension vectors using SOMs. The
tions. Lastly, we only selected 60 publications to present the system analyzed blockchain data using Kohonen and SOM-
taxonomy, as shown in Figure 3. Here, each layer is color- brero libraries (in the R programming environment). The
coded to tailor each level of the taxonomy. For example, the result shows the effective key attributes monitoring of the
root represents the level-0 of the classified taxonomy and blockchain nodes and finds the emerging patterns. More,
presented in blue color. In a similar way, the four major another approach included the distributed pattern recognition
dimensions are representing as level-1 in light-green color system with the concept of Graph Neurons (GNs) [31] to
and so onwards. monitor the blockchain system. GNs are scalable and could
recognize patterns from similar or incomplete patterns. The
B. TAXONOMY GN communicated with adjacent nodes to detect events
In this paper, we studied the papers that are predominantly within the network by using input data. Preliminary results
based on either ML, blockchain, or both. The presented showed object detection by the GN was accurate; still, further
survey has been divided into four dimensions: Goal Oriented, work is needed in the area.
Layer Oriented, Countermeasures, and Smart Applications.
Figure 3 shows the taxonomy of ML adoption for blockchain- C. PREDICTION
based smart applications. The ML models are mostly used for prediction. A good
prediction model helps to make the right decision making
IV. GOAL ORIENTED and analytics. Added to this, an ML model to predict the
In this dimension, research work has been included from the bitcoin prices has been proposed by Valenkar et al. [30].
following aspects: (i) preventing, (ii) predicting, (iii) mon- This model uses bayesian regression and random forest with
itoring, (iv) detection, and (v) response of blockchain. For several features such as block size, total bitcoins, day high,
instance, [29] discussed the detection of intrusion in a collab- number of transactions, and trade volume. The trained dataset
orative manner, [30] predicts bitcoin prices using Bayesian was normalized using log, z-score, and box-cox normaliza-
regression method and [31] monitors the blockchain network tion techniques. Further, a price prediction study has been
in a distributed manner. done for several cryptocurrencies such as Ripple, Litecoin,
Dash, Bitcoin, and Ethereum cryptocurrencies [34]. Here,
A. DETECTION correlation matrices for feature selections used and reported
This subsection includes the detection of the attacks to the general trends within the network. The proposed model
handle data security issues. Meng et al. [12] has proposed used multiple regression techniques on bitcoin. The system
a Collaborative IDS (CIDS) with a data-sharing agreement showed the 0.9944 accuracies for price prediction.
on a blockchain-based environment. Data privacy issues of
VOLUME 4, 2016 5
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
Application Customer
Detection Analytical
Layer Services
Device
Monitoring Endpoint Real-Time
Personalization
Product
Prediction Process Manufacturing
UAV
Prevention
Smart Cities
Energy and
Utilities
FIGURE 3: Proposed Taxonomy for Machine Learning adoption in Blockchain-based Smart Applications
D. RESPONSE using the key. Then, each work history entry compared
Tsolakis et al. [35] presented an approach for the secure with the database of the previous organization. This ensures
exchange of energy data between a cluster of end-users and consistency and integrity of data as well as the authenticity
a Virtual Node. This approach uses a blockchain-based ar- of the sender.
chitecture to give a demand response solution. This solution A similar idea to tracking studentâĂŹs learning history
included Fog-Enabled Intelligent Devices (FEID) [36] at the has been proposed [40]. The main aim was to maintain the
user side (act as a blockchain node) and managed smart learning histories of the students and ensure access control,
contracts with the energy producer [36] in cloud computing privacy, and security. To ensure privacy and access con-
platform [37] [38]. Then, a group of energy users combined trol, three contracts were suggested: Learner âĂŞ Learning
into a centralized Virtual Node. All predictions and forecast- Provider Contract (LLPC), Registrar âĂŞ Learning Provider
ing about the energy consumption have done on the Virtual Contract (RLPC), and Index Contract (IC). The role of RLPC
Nodes. The end-user learned itself from each experience that is to specify all conditions that describe request access by
helps to improve the accuracy of data passed as the next the provider within the network. LLPC shows that a learner’s
iteration to the virtual node. data exists on the providerâĂŹs database. The IC map the
learners and providers and the corresponding learning his-
tory. Here, specialized Learning Blockchain Application Pro-
E. PREVENTION
gram Interfaces (LB APIs) has been proposed to encourage
One of the based uses of ML in BT based application is the the adoption of this technology. Initially, the system is started
prevention of an issue; for instance, employee verification by with a boot node in the network. A new provider is added
a future employer. A mechanism proposed to reduce the time to the network as per the conditions described in RLPC. A
taken to verify work history details provided by a prospective new learner account is created and noted LLPC. In case, the
employee [39]. The previously worked organization has to new provider wants access to learners’ data, it has to request
compile details of an employee (date of joining, leaving, the learner using the LLPC, and upon granting, data will be
post, etc.), and a public key is generated to encrypt the accessible.
data. Subsequently, a new smart contract is created for the
employee. Then, the address of the smart contract is entered
into the organizationâĂŹs database, and later it verified by
the future employer. In a future organization, work history is
fetched from the smart contract of employees and decrypted
6 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
device sends the computations to edge servers. Then, the E. COMPARISON OF EXISTING APPROACHES FOR
edge server returns the results, which are verified by other LAYER ORIENTED USE CASES
nodes within the network. The server is rewarded for its A detailed comparison of the approaches is discussed in
work after validation. The typical Ethereum architecture had Table 3. This comparison is made based on several param-
been modified in this implementation by replacing Ethereum eters such as edge computing, blockchain, neural network,
virtual machine by V8 javascript virtual machine. The blocks supervised learning, pros, and cons of the proposed approach.
generation part had been separated from the virtual machine
to ensure that smart contract execution cannot affect the VI. COUNTERMEASURES
rate of generation of blocks. The system performance shows The ML approached in response to a threat or monitoring
better results compare to the state-of-art approaches. a system can be classified as real-time analytics or analysis
based on historical data [33]
C. PROCESS
A. ANALYTICAL
This subsection comprises ML techniques to the process in-
In todayâĂŹs world, every enterprise generates huge
volves in the blockchain-based applications. An ML classifier
amounts of data from different sources such as social me-
has been used to detect the human traffickers using adult
dia, smartphones, IoT, and other computing devices. These
classified ads [46]. It included ads dataset from Backpage (a
data are tremendously valuable to organizations. The overall
website for online classifieds). It used a supervised learning
technique to find a meaningful pattern from these data is
model and used logistic regression for classification. The
called data analytics. It is a process to convert data from
labeled dataset with identifiers like email and phone number
foresight to insight. It describes what happened in the past,
has been used for testing. This approach takes two ads at a
draw awareness about the present, and make predictions
time as an input to the model. If the ads are from the same
(with some ML techniques) about the future. ML techniques
author, the output will be same. The trained model showed an
can be categories as supervised, unsupervised, and reinforce-
89.54% true positive rate. Further, this approach used to build
ment learning to analyses the data. The supervised learn-
a graph and found links between ads and their related bitcoin
ing included classification and regression originated on the
transactions. This approach showed a high false-positive rate.
idea of example-based learning. Next, unsupervised learning
techniques perform clustering, dimensionality reduction, and
D. USER recommendation of a system based on the dataset. This used
Users are the individual or system that uses the system to recognize hidden patterns or focus on the well-educated
functionality seating at one end of the application. Wasim behavior of the machine. The reinforcement learning ap-
et. al [47] proposed law as a service ML-based architecture proach helps to reward maximization. In the next decades,
to monitor contract breaches. Previously, contract breaches our society will be driven by new technological developments
were dealt with or without the use of courts. The pro- in ML and BT. Further, a traceability algorithm has been pro-
posed system used an unsupervised ML algorithm called posed for bitcoin mining by using the ANN approach [51].
Probability-based Factor Model to issue injunctions. This It aimed to remove irrelevant data in mining and introduce
model simulated using three service providers Redis [48], traceability to the system. This was helpful in a distributed
MongoDB [49], and Memcached Servers [50]. Services architecture and decrease traceability time.
monitor the contracts for breaches. The results showed that DL is a subset of ML that is originated on definitive
services that perform complex operations are more likely to algorithms influenced by the overall structure and work of
breach contracts. the neural network in the human brain. DL rationalizes
tasks to perform speech recognition, image recognition, make
8 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
B. REAL-TIME
ML enables real-time analytics for all types of data, such as
social âĂŞ accessible, transactional, and operational. It uses
in-memory computing though leaving unremittingly updated
data securely. It improves analytics accuracy and accelerates
the predictive behavior of ML models. It has been noticed
that BT makes real-time cross edge transactions in monetary FIGURE 4: A list of Smart Applications
and payment frameworks. Several fintech innovators and
banks are currently investigating blockchain due to fast and
real-time settlement of massive amounts independent of geo- A. CUSTOMER SERVICE
graphic hindrances. Similarly, associations that require real- With the upsurge of the customer, the Customer service has
time analytics of information on a huge scale can approach to be more efficient and automated to meet rising customer
an ML and blockchain-empowered framework to accomplish needs. One of the best ways is to automate the process to
the goal. With ML and BT, financial institutions and other increase a companyâĂŹs capabilities. Wang et al. [58] pro-
associated organizations across the globe can trace the data posed an AutoML framework for the blockchain-based appli-
changes to make quick and fast business decisions regard- cation. It consists six layers: (i) Organization Layer (Includes
less of irregular activities or suspicious transactions. More- entities such as shops, malls, online stores), (ii) Customer
over, the performance of the blockchain-based Software- Layer, (iii) Application Layer (applications provide services
Defined Vehicular Network (SDVN) has been improved us- to the consumers), (iv) Data conversion layer(Data masking
ing deep Q-learning methodology [53] [54]. This approach and unmasking), (v) AutoML layer (Consists various ML
used a permissioned blockchain with Byzantine fault tol- models such as Linear regression, SVM and logistic regres-
erance as a consensus protocol. Results showed that this sion for predictions), (vi) Blockchain Layer (Secure storage
scheme managed network and computing resources better of data and ensures the safe data exchange) This framework
and gave the best throughput in the SDVN [55]. Further, helps organizations to keep their data safe, automate their
Liu et al. [22] recommended a data collection framework for processes and share data with other organizations in a mu-
Industrial-IoT (IIoT) applications. This framework combines tually beneficial and safe way.
the use of deep reinforcement learning (DRL) and Ethereum
blockchain. To store and share data, Ethereum nodes were B. DEVICE PERSONALIZATION
categories into two categories: mining nodes and nonmining
Device Personalization (DP) is a component that uses pre-
nodes. The proposed DRL algorithm used three plain compo-
dictions across smart devices to improves the quality of
nents, actions (moving path and remoteness of mobile termi-
service (QoS) such as actions in the launcher, smart text
nals), states (environment description), and rewards (amount
selection during writing on text pad. DP Services uses system
achieved). The proposed algorithm shows the 34.5% increase
permissions to provide smart predictions. In a smart home
in geographical fairness compared to a random solution.
environment, and ML model-based single DP framework has
been implemented [59]. Here, smart devices connected to a
VII. SMART APPLICATIONS smart hub. Every time a user uses a device, a log is generated
The last dimension covers the adoption of ML techniques with user data, device data, and other parameters for that
to BT-based smart applications such as data trading, UAV, device. For example, uses of air conditioner at home. This
product manufacturing, Medical, and Healthcare [56], Smart log data help to adjust the operation of the device.
Cities, automated Customer Service, and Device Personaliza-
tion as shown in Figure 4. ML and BT are revolutionizing up- C. PRODUCT MANUFACTURING
to-date technologies by transforming customer experiences, As a feature of the manufacturing process, organizations
behaviors, and business models [57]. Both are making strides have started trusting blockchain-based procedures to em-
in the major smart application: power production, security, transparency, and compliance
checks. Instead of following fixed schedules of machine
VOLUME 4, 2016 9
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
maintenance, ML algorithms are being used to make flexible estate, and utilities [61]. (i) Smart Homes: Smart homes
plans at specific periods. Product testing and quality control can be monitored, and DP can help to improve the quality
have also automated increasingly, with versatile algorithms. of livelihood. (ii) Smart Parking System: Here, arrival and
It successfully detects faulty and good products, particularly departure of vehicles can be tracked for different parking
in profoundly delicate situations. For example, Porsche (a car lots available in a decentralized manner within the smart city
manufacturing company) is one of those early adopters of [61]. Consequently, smart parking lots should be designed by
ML and BT technologies; to improve automobile safety and seeing the number of cars in each region. Furthermore, new
increase capabilities. The organization utilizes blockchain parking lots must be recognized spontaneously to benefits in
innovation to transfer data more safely and rapidly, offering dealers and vehicle ownerâĂŹs daily life. (iii) Smart Weather
its clients peace of mind, regardless of parking, charging, and and Water Systems: Here, the system can use some sensors
third-party access to their car. to generate appropriate data such as temperature, wind speed,
rain, and pressure. The analysis of these data through ML
D. DATA TRADING techniques can contribute to improving the density of smart
DataTrading is an innovative platform that makes advanced cities. (iv) Smart Vehicular Traffic: Vehicular traffic data with
trading possible for retail traders from all over the world. An a suitable analysis will benefit the government and citizens to
Ethereum based data trading framework has presented that a great extent [62]. Everyone can decide the arrival time to
succeeded in preventing single-point failure and preserving a destination by using these data. (v) Surveillance Systems:
privacy at the same time [10]. The framework consists of Physical security is an utmost important concern for citizens
three entities, data provider, a data consumer, and a market anywhere they live. To address this issue, smart technology
manager. Once the network is set up, the data consumer and such as ML and BT can be configured for it. Consequently,
data provider registered themselves with the market manager. collecting and analyzing data and identifying crimes is one of
The data provider needed to deposit an amount with the the challenging tasks. (vi) Smart Healthcare: It includes the
manager greater than the amount to be paid by the consumer. accessibility of the caregivers and doctors, identification of
A list indicating topics of data available with the provider is nearest medical stores, and clinic. Hence, ML and BT play
published. The client referred it and requests some encrypted a vital role while data is getting generated [63] [64]. (vii)
data blocks for content validation using a distance metric Smart Governance and Smart Education: Smart governance
learning technique. After successful validation, the client can maintain a city smartly. A smart city includes a differ-
responded, and the provider sent a signature, and the client ent way of education. It captures the data of the students
published a smart contract to the network. The provider then and employees in educational and government institutions.
sent another signature, and these two signatures, the client, Predictions and analytics required to keep the stuff up to
decrypted the data. There are different protocols such as setup standards.
protocol, register protocol, payment and acknowledgment
protocol, and query protocol that facilitate the communica- G. ENERGY AND UTILITIES
tion between provider, consumer, and the manager. In the Energy industry, BT is assisting to simplify energy
exchanges. For example, IOTA enables smart transformation
E. UNMANNED AERIAL VEHICLE across the entire energy industry by implementing BT [65].
A UAV or drone is an aircraft that runs without a pilot It uses the concept of peer-to-peer (P2P) energy production
(human) aboard. Kuzmin et al. [9] has proposed blockchain- and consumption. Smart energy microgrids are progressively
based UAVNet model includes different devices such as developing fame as a technique of making ecological energy
a network of satellites, cellular base stations, and ground resources. LO3 Energy (a Newyork-based organization) is
control stations. Here, BT served multiple purposes, such also using a blockchain-based development to develop en-
as preserving the integrity of the data and for distributed ergy generation, transmission, conservation, and exchanging
graphs computation. The communication between satellites within neighborhood networks. The technology uses micro-
and base stations is prone to electromagnetic jamming, hence grid and smart meters, together with smart contracts, to
a blockchain-based system enables UAVs to store relevant manage and track energy transactions. GE Digital, together
coordinateâĂŹs data and operate autonomously within the with Evolution Energie (a startup), has created an application
jamming zone. This solution used a proof-of-graph consen- that encourages the tracking of renewable energy in SG and
sus algorithm with a simplified memory bounded algorithm uses blockchain to give energy sources certificate. The idea
of any existing shortest path to validating a new transaction. is allowing organizations and individuals to trade renewable
energy sources without the involvement of third-party [36].
F. SMART CITIES Globally, most of the industries are dogged by third-party,
Smart cities improve the living experiences of individuals. who increase the business cost. BT has already interrupted
ML and blockchain emergent technologies play a crucial role that model by facilitating the P2P model for customers.
in the innovation of smart cities to provide critical services The revolution works even better when combined with the
and infrastructure components such as healthcare [60], city ML and BT together. We have been witnessed the financial
administration, smart homes, education, transportation, real revolution by using the cryptocurrency world; similarly, we
10 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
A. SUITABILITY
Blockchain is a viable solution if the source of data cannot be
Quantum
trusted, and several entities are high in the distributed envi- Security
resilience
ronment. If performance is required, then a simple database
is a better option. Therefore, the architecture of blockchain
must be understood before its use in any application [67].
FIGURE 5: Future Research Issues and Challenges
B. INFRASTRUCTURE
Blockchain specific hardware and network infrastructure im-
addition of blocks and transactions needs to be decreased to
prove the performance of many blockchain-based applica-
meet the inevitable demand.
tions. These could include network administration, mining
hardware, decentralized storage, and communication proto-
F. SECURITY
cols [30]. However, products tailored to use in blockchain
are still under investigation (involving major tech companies Blockchains are decentralized, and they are prone to security
and financial institutions). issues [68]. The most common concern is that due to attacks,
the consensus protocol may be compromised, such that the
mining power of a few farms will control which blocks are
C. PRIVACY
added to the network. This particular concern is present in
Data generated by devices to be stored on the blockchain is public blockchains. Private versions are unaffected by this
available to the entire blockchain nodes [33]. This leads to a attack as they have each node identified, and an appropriate
potential privacy concern for data that needs to be kept either consensus protocol is in place.
private or confidential. Such issues could be resolved by the
use of private blockchains, controlled access, and encryption. G. QUANTUM RESILIENCE
However, the ML models adoption on these limited data
The hashing algorithms used by blockchains could soon be
imposed barriers for predictions and analytics.
broken with quantum computers. A blockchain is predom-
inantly at risk from this because it uses one-way functions
D. MEMORY for encryption (only protection in digital signature). This
The size of blockchain keeps growing as new blocks are would cause all the features that make blockchains a viable
added to it. Consequently, the entire chain must be stored storage structure (obsolete). Luckily, quantum computing
by all nodes, which creates a significant memory constraint offers opportunities to boost the performance and security of
on these devices. The performance is also affected by an blockchains. Quantum cryptography can reinforce the secu-
increase in chain size. Besides that, the storage of irrelevant rity of the blockchain network as quantum communication is
data also wastes computational resources. Blockchains are authenticated inherently (users cannot mimic another user). It
immutable, and hence storage management is a major issue can encrypt entire P2P communications and replace classical
in most implementations. digital signatures in the blockchain network. Research is
underway to design blockchain with quantum computing
E. IMPLEMENTATION [69].
A large- scale blockchain network will require an equiva-
lently large number of transactions. Implementation of this IX. CASE STUDY
size of blockchain invites potential issues; for instance, high In order to demonstrate the proposed architecture for ML
demand for internet bandwidth, which not easy to reduce, adoption in blockchain-based smart applications, we present
transactions will be a burden on the network. Hence, the a case study, as shown in Figure 6. In this case study, we study
VOLUME 4, 2016 11
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
Energy Storage
Device
Smart Blockchain
Grid
Buildings
Industries
Individual Houses
a blockchain-based SG system for energy transactions using utility provider, or SG. Blockchain entity is a distributed
cryptocurrency [70] [71]. This framework uses a blockchain digital ledger, which is encompassing all energy transactions
and DL approach to complete an energy transaction. It is in the SG system.
a reliable P2P energy system. It is based on the Byzantine Once an energy seller produces energy from renewable
fault tolerance algorithm to produce high system throughput. energy sources and uses that energy for his own use. After
This approach consists of five phases (i)setup phase, (ii) that, if the seller left with energy, then he publishes his per-
agreement phase, (iii) consensus-making phase, (iv) block unit prices per kilowatt energy on the blockchain network.
creation phase, and (v) a change view phase. Here, blocks In this P2P energy trading system, the needed energy buyer
are generated using hash functions and a short signature. It will look upon the published price and unit of energy. First of
is an IDS that works on recurrent neural networks to detect all, the energy buyer checks his account that he has sufficient
fraudulent transactions and network attacks in blockchain- cryptocurrency balance for energy trading. Then, if the en-
based energy applications. The performance of this IDS has ergy demand of energy buyers and per-unit price matched his
been studied on different energy datasets. It consists of four requirement of energy at that moment, he sends a purchase
entities for communications: (a) Energy Buyer, (b) Energy request to the energy seller through the blockchain network.
Seller, (c) Blockchain, and (d) IDS [41]. Energy buyer trade After validation of the buyer on the blockchain network seller
energy with the energy seller. An energy buyer shows that sells the energy to the buyer and receives cryptocurrency in
he has sufficient energy money (cryptocurrency) that fulfills his account. This P2P energy trading system required further
the minimum asset requirement of energy sellers. An energy data analysis to identify the frequent buyer and seller for
buyer will be a person or commercial building or industry. the recognition of malicious transactions within the network.
Energy buyers can be located in a Home Area Network A malicious block or node can impact the P2P system and
(HAN), Building Area Network (BAN), or Neighborhood compete for energy trading. IDS can help to figure out the
area Network (NAN). Energy seller entities demonstrate that deceitful transactions and network attacks on energy trading
it has sufficient energy to sell. Energy sellers can be located applications [72]. The result shows the good performance of
in HAN, BAN, NAN, or energy companies. Energy seller the system compares to the state-of-art approaches.
(entities) produces energy from renewable sources such as
wind energy, solar energy, and biomass. The seller can be
a neighbor, local society with renewable energy resources,
12 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
X. CONCLUSION [13] M. Conti, E. Sandeep Kumar, C. Lal, and S. Ruj, “A survey on security
and privacy issues of bitcoin,” IEEE Communications Surveys Tutorials,
The recent advancements in Blockchain and ML have made vol. 20, pp. 3416–3452, Fourthquarter 2018.
them path-breaking technologies. The distributed ledger has [14] D. Ucci, L. Aniello, and R. Baldoni, “Survey of machine learning tech-
the possibility to work as the backbone of various smart niques for malware analysis,” Computers & Security, vol. 81, pp. 123 –
147, 2019.
applications such as smart cities, UAV, SG, data trading. In
[15] K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha,
this paper, we have presented detailed information on BT “Blockchain for ai: Review and open research challenges,” IEEE Access,
and ML, along with their usages in smart applications and vol. 7, pp. 10127–10149, 2019.
proposed an ML-BT based architecture. This architecture [16] F. Casino, T. K. Dasaklis, and C. Patsakis, “A systematic literature review
of blockchain-based applications: Current status, classification and open
can be used to design and deploy an ML-BT based data issues,” Telematics and Informatics, vol. 36, pp. 55 – 81, 2019.
analysis system. A discussion and comparison of various [17] W. Xiong and L. Xiong, “Smart contract based data trading mode using
existing surveys are presented. Then, we presented ML-BT blockchain and machine learning,” IEEE Access, vol. 7, pp. 102331–
102344, 2019.
solution taxonomy, focusing on goal oriented, layer oriented, [18] T. M. Mitchell, Machine Learning. New York, NY, USA: McGraw-Hill,
countermeasures, and smart application dimensions. A com- Inc., 1 ed., 1997.
parative analysis of available methodologies and approaches [19] P. Louridas and C. Ebert, “Machine learning,” IEEE Software, vol. 33,
pp. 110–115, Sep. 2016.
is presented in each dimension. Then, we have listed several
[20] R. Saravanan and P. Sujatha, “A state of art techniques on machine learn-
research challenges being faced during ML adoption in BT- ing algorithms: A perspective of supervised learning approaches in data
based systems, which require solutions. We also emphasized classification,” in 2018 Second International Conference on Intelligent
Computing and Control Systems (ICICCS), pp. 945–949, June 2018.
a number of research prospects such as infrastructure avail-
[21] V. Vats, L. Zhang, S. Chatterjee, S. Ahmed, E. Enziama, and K. Tepe, “A
ability, quantum resilience, and privacy issues that can serve comparative analysis of unsupervised machine techniques for liver disease
as future research directions in this field. Then, we presented prediction,” in 2018 IEEE International Symposium on Signal Processing
a case study on the energy trading system to verify the and Information Technology (ISSPIT), pp. 486–489, Dec 2018.
[22] C. Liu, X. Xu, and D. Hu, “Multiobjective reinforcement learning: A
effectiveness of the proposed architecture and concluded the comprehensive overview,” IEEE Transactions on Systems, Man, and Cy-
paper at last. bernetics: Systems, vol. 45, pp. 385–398, March 2015.
[23] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview of
blockchain technology: Architecture, consensus, and future trends,” in
REFERENCES 2017 IEEE International Congress on Big Data (BigData Congress),
pp. 557–564, June 2017.
[1] S. Kaneriya, J. Vora, S. Tanwar, and S. Tyagi, “Standardising the use of
[24] G. B. Mermer, E. Zeydan, and S. S. Arslan, “An overview of blockchain
duplex channels in 5g-wifi networking for ambient assisted living,” in
technologies: Principles, opportunities and challenges,” in 2018 26th
2019 IEEE International Conference on Communications Workshops (ICC
Signal Processing and Communications Applications Conference (SIU),
Workshops), pp. 1–6, May 2019.
pp. 1–4, May 2018.
[2] S. Tyagi, M. S. Obaidat, S. Tanwar, N. Kumar, and M. Lal, “Sensor
[25] W. Penard and T. van Werkhoven, “On the secure hash algorithm family,”
cloud based measurement to management system for precise irrigation,”
Cryptography in Context, pp. 1–18, 2008.
in GLOBECOM 2017 - 2017 IEEE Global Communications Conference,
[26] M. Vukolić, “The quest for scalable blockchain fabric: Proof-of-work vs.
pp. 1–6, Dec 2017.
bft replication,” in Open Problems in Network Security (J. Camenisch
[3] U. Bodkhe, P. Bhattacharya, S. Tanwar, S. Tyagi, N. Kumar, and M. S.
and D. Kesdoğan, eds.), (Cham), pp. 112–125, Springer International
Obaidat, “Blohost: Blockchain enabled smart tourism and hospitality
Publishing, 2016.
management,” in 2019 International Conference on Computer, Information
[27] S. Thompson, P. L. Seijas, and D. Adams, “Scripting smart contracts for
and Telecommunication Systems (CITS), pp. 1–5, Aug 2019.
distributed ledger technology.” December 2016.
[4] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2009.
[28] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for
[5] M. Rahouti, K. Xiong, and N. Ghani, “Bitcoin concepts, threats, and the internet of things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.
machine-learning security solutions,” IEEE Access, vol. 6, pp. 67189– [29] N. Alexopoulos, E. Vasilomanolakis, N. R. Ivánkó, and M. Mühlhäuser,
67205, 2018. “Towards blockchain-based collaborative intrusion detection systems,” in
[6] A. P. Namanya, A. Cullen, I. U. Awan, and J. P. Disso, “The world of Critical Information Infrastructures Security (G. D’Agostino and A. Scala,
malware: An overview,” in 2018 IEEE 6th International Conference on eds.), (Cham), pp. 107–118, Springer International Publishing, 2018.
Future Internet of Things and Cloud (FiCloud), pp. 420–427, Aug 2018. [30] S. Velankar, S. Valecha, and S. Maji, “Bitcoin price prediction using
[7] S. Krit and E. Haimoud, “Overview of firewalls: Types and policies: machine learning,” in 2018 20th International Conference on Advanced
Managing windows embedded firewall programmatically,” in 2017 Inter- Communication Technology (ICACT), pp. 144–147, Feb 2018.
national Conference on Engineering MIS (ICEMIS), pp. 1–7, May 2017. [31] A. Hudaya, M. Amin, N. M. Ahmad, and S. Kannan, “Integrating dis-
[8] G. Betarte, E. Gimenez, R. Martinez, and A. Pardo, “Improving web tributed pattern recognition technique for event monitoring within the iot-
application firewalls through anomaly detection,” in 2018 17th IEEE In- blockchain network,” in 2018 International Conference on Intelligent and
ternational Conference on Machine Learning and Applications (ICMLA), Advanced System (ICIAS), pp. 1–6, Aug 2018.
pp. 779–784, Dec 2018. [32] M. Signorini, M. Pontecorvi, W. Kanoun, and R. D. Pietro, “BAD:
[9] A. Kuzmin and E. Znak, “Blockchain-base structures for a secure and blockchain anomaly detection,” CoRR, vol. abs/1807.03833, 2018.
operate network of semi-autonomous unmanned aerial vehicles,” in 2018 [33] S. Chawathe, “Monitoring blockchains with self-organizing maps,” in
IEEE International Conference on Service Operations and Logistics, and 2018 17th IEEE International Conference On Trust, Security And Privacy
Informatics (SOLI), pp. 32–37, July 2018. In Computing And Communications/ 12th IEEE International Conference
[10] Y. Zhao, Y. Yu, Y. Li, G. Han, and X. Du, “Machine learning based privacy- On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1870–
preserving fair data trading in big data market,” Information Sciences, 1875, Aug 2018.
vol. 478, pp. 449 – 460, 2019. [34] M. Saad and A. Mohaisen, “Towards characterizing blockchain-based
[11] C. Pop, T. Cioara, M. Antal, I. Anghel, I. Salomie, and M. Bertoncini, cryptocurrencies for highly-accurate predictions,” in IEEE INFOCOM
“Blockchain based decentralized management of demand response pro- 2018 - IEEE Conference on Computer Communications Workshops (IN-
grams in smart energy grids,” Sensors, vol. 18, no. 1, p. 162, 2018. FOCOM WKSHPS), pp. 704–709, April 2018.
[12] W. Meng, E. W. Tischhauser, Q. Wang, Y. Wang, and J. Han, “When [35] A. C. Tsolakis, I. Moschos, K. Votis, D. Ioannidis, T. Dimitrios, P. Pandey,
intrusion detection meets blockchain technology: A review,” IEEE Access, S. Katsikas, E. Kotsakis, and R. Garcà a-Castro, “A secured and trusted
vol. 6, pp. 10179–10188, 2018. demand response system based on blockchain technologies,” in 2018
VOLUME 4, 2016 13
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
Innovations in Intelligent Systems and Applications (INISTA), pp. 1–6, [56] J. Vora, A. Nayyar, S. Tanwar, S. Tyagi, N. Kumar, M. S. Obaidat,
July 2018. and J. J. P. C. Rodrigues, “Bheem: A blockchain-based framework for
[36] A. Kumari, S. Tanwar, S. Tyagi, N. Kumar, M. S. Obaidat, and J. J. securing electronic health records,” in 2018 IEEE Globecom Workshops
Rodrigues, “Fog computing for smart grid systems in the 5g environment: (GC Wkshps), pp. 1–6, Dec 2018.
Challenges and solutions,” IEEE Wireless Communications, vol. 26, no. 3, [57] S. K. Singh, M. M. Salim, M. Cho, J. Cha, Y. Pan, and J. H. Park, “Smart
pp. 47–53, 2019. contract-based pool hopping attack prevention for blockchain networks,”
[37] J. Vora, P. DevMurari, S. Tanwar, S. Tyagi, N. Kumar, and M. S. Obaidat, Symmetry, vol. 11, no. 7, p. 941, 2019.
“Blind signatures based secured e-healthcare system,” in 2018 Inter- [58] W. M. Wang, H. Guo, Z. Li, Y. Shen, and A. V. Barenji, “Towards open
national Conference on Computer, Information and Telecommunication and automated customer service: A blockchain-based automl framework,”
Systems (CITS), pp. 1–5, July 2018. in Proceedings of the 2Nd International Conference on Computer Science
[38] S. Tanwar, J. Vora, S. Kaneriya, and S. Tyagi, “Fog-based enhanced safety and Application Engineering, CSAE ’18, (New York, NY, USA), pp. 27:1–
management system for miners,” in 2017 3rd International Conference on 27:6, ACM, 2018.
Advances in Computing,Communication Automation (ICACCA) (Fall), [59] K. Singla, J. Bose, and S. Katariya, “Machine learning for secure device
pp. 1–6, Sep. 2017. personalization using blockchain,” in 2018 International Conference on
[39] P. Sarda, M. J. M. Chowdhury, A. Colman, M. A. Kabir, and J. Han, Advances in Computing, Communications and Informatics (ICACCI),
“Blockchain for fraud prevention: A work-history fraud prevention sys- pp. 67–73, Sep. 2018.
tem,” in 2018 17th IEEE International Conference On Trust, Secu- [60] R. Gupta, S. Tanwar, S. Tyagi, N. Kumar, M. S. Obaidat, and B. Sadoun,
rity And Privacy In Computing And Communications/ 12th IEEE In- “Habits: Blockchain-based telesurgery framework for healthcare 4.0,” in
ternational Conference On Big Data Science And Engineering (Trust- 2019 International Conference on Computer, Information and Telecom-
Com/BigDataSE), pp. 1858–1863, Aug 2018. munication Systems (CITS), pp. 1–5, Aug 2019.
[40] P. Ocheja, B. Flanagan, and H. Ogata, “Connecting decentralized learning [61] A. Kumari, S. Tanwar, S. Tyagi, N. Kumar, M. Maasberg, and K.-K. R.
records: A blockchain based learning analytics platform,” in Proceedings Choo, “Multimedia big data computing and internet of things applications:
of the 8th International Conference on Learning Analytics and Knowledge, A taxonomy and process model,” Journal of Network and Computer
LAK ’18, (New York, NY, USA), pp. 265–269, ACM, 2018. Applications, vol. 124, pp. 169–195, 2018.
[41] H. Liang, J. Wu, S. Mumtaz, J. Li, X. Lin, and M. Wen, “Mbid: Micro- [62] A. Mewada, S. Tanwar, and Z. Narmawala, “Comparison and evaluation
blockchain-based geographical dynamic intrusion detection for v2x,” of real time reservation technologies in the intelligent public transport
IEEE Communications Magazine, vol. 57, no. 10, pp. 77–83, 2019. system,” in 2018 Fifth International Conference on Parallel, Distributed
and Grid Computing (PDGC), pp. 800–805, Dec 2018.
[42] K. Sgantzos and I. Grigg, “Artificial intelligence implementations on the
[63] A. Kumari, S. Tanwar, S. Tyagi, and N. Kumar, “Fog computing for
blockchain. use cases and future applications,” Future Internet, vol. 11,
healthcare 4.0 environment: Opportunities and challenges,” Computers &
no. 8, p. 170, 2019.
Electrical Engineering, vol. 72, pp. 1–13, 2018.
[43] S. Raje, S. Vaderia, N. Wilson, and R. Panigrahi, “Decentralised firewall
[64] S. Tanwar, K. Parekh, and R. Evans, “Blockchain-based electronic health-
for malware detection,” in 2017 International Conference on Advances in
care record system for healthcare 4.0 applications,” Journal of Information
Computing, Communication and Control (ICAC3), pp. 1–5, Dec 2017.
Security and Applications, vol. 50, p. 102407, 2020.
[44] N. C. Luong, Z. Xiong, P. Wang, and D. Niyato, “Optimal auction for [65] “Iota.” https://www.iota.org/. Online; Accessed: 4-November-2019.
edge computing resource management in mobile blockchain networks: [66] S. K. Singh, S. Rathore, and J. H. Park, “Blockiotintelligence: A
A deep learning approach,” in 2018 IEEE International Conference on blockchain-enabled intelligent iot architecture with artificial intelligence,”
Communications (ICC), pp. 1–6, May 2018. Future Generation Computer Systems, 2019.
[45] J.-Y. Kim and S.-M. Moon, “Blockchain-based edge computing for deep [67] K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha,
neural network applications,” in Proceedings of the Workshop on INTel- “Blockchain for ai: review and open research challenges,” IEEE Access,
ligent Embedded Systems Architectures and Applications, INTESA ’18, vol. 7, pp. 10127–10149, 2019.
(New York, NY, USA), pp. 53–55, ACM, 2018. [68] A. Kumari, S. Tanwar, S. Tyagi, and N. Kumar, “Verification and validation
[46] R. S. Portnoff, D. Y. Huang, P. Doerfler, S. Afroz, and D. McCoy, “Back- techniques for streaming big data analytics in internet of things environ-
page and bitcoin: Uncovering human traffickers,” in Proceedings of the ment,” IET Networks, vol. 8, no. 2, pp. 92–100, 2018.
23rd ACM SIGKDD International Conference on Knowledge Discovery [69] A. K. Fedorov, E. O. Kiktenko, and A. I. Lvovsky, “Quantum computers
and Data Mining, KDD ’17, (New York, NY, USA), pp. 1595–1604, ACM, put blockchain security at risk,” 2018.
2017. [70] M. A. Ferrag and L. Maglaras, “DeepCoin: A Novel Deep Learning and
[47] M. U. Wasim, A. A. Z. A. Ibrahim, P. Bouvry, and T. Limba, “Law as Blockchain-Based Energy Exchange Framework for Smart Grids,” IEEE
a service (laas): Enabling legal protection over a blockchain network,” in Transactions on Engineering Management, vol. PP, pp. 1–13, 2019.
2017 14th International Conference on Smart Cities: Improving Quality of [71] N. Wang, X. Zhou, X. Lu, Z. Guan, L. Wu, X. Du, and M. Guizani, “When
Life Using ICT IoT (HONET-ICT), pp. 110–114, Oct 2017. energy trading meets blockchain in electrical power system: The state of
[48] “redis.” https://redis.io/. Online; Accessed: 4-December-2019. the art,” Applied Sciences, vol. 9, no. 8, p. 1561, 2019.
[49] “mongodb.” https://www.mongodb.com/. Online; Accessed: 4-November- [72] N. Kabra, P. Bhattacharya, S. Tanwar, and S. Tyagi, “Mudrachain:
2019. Blockchain-based framework for automated cheque clearance in financial
[50] “Memcached.” https://memcached.org/. Online; Accessed: 11-November- institutions,” Future Generation Computer Systems, vol. 102, pp. 574 –
2019. 587, 2020.
[51] R.-Y. Chen, “A traceability chain algorithm for artificial neural networks
using tâĂŞs fuzzy cognitive maps in blockchain,” Future Generation
Computer Systems, vol. 80, pp. 198 – 210, 2018.
[52] H. Sun Yin and R. Vatrapu, “A first estimation of the proportion of
cybercriminal entities in the bitcoin ecosystem using supervised machine
learning,” in 2017 IEEE International Conference on Big Data (Big Data),
pp. 3690–3699, Dec 2017.
[53] C. Qiu, F. R. Yu, F. Xu, H. Yao, and C. Zhao, “Blockchain-based
distributed software-defined vehicular networks via deep q-learning,” in
Proceedings of the 8th ACM Symposium on Design and Analysis of In-
telligent Vehicular Networks and Applications, DIVANet’18, (New York,
NY, USA), pp. 8–14, ACM, 2018.
[54] J. Bhatia, R. Dave, H. Bhayani, S. Tanwar, and A. Nayyar, “Sdn-based
real-time urban traffic analysis in vanet environment,” Computer Commu-
nications, vol. 149, pp. 162–175, 10 2019.
[55] J. Bhatia, Y. Modi, S. Tanwar, and M. Bhavsar, “Software defined vehicu-
lar networks: A comprehensive review,” International Journal of Commu-
nication Systems, vol. 32, no. 12, p. e4005, 2019.
14 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2961372, IEEE Access
Tanwar et al.: Machine Learning adoption in Blockchain-based Smart Applications: The challenges, and a way forward
SUDEEP TANWAR is an Associate Professor APARNA KUMARI pursuing Ph.D. from Depart-
in the Computer Science and Engineering De- ment of Computer Science and Engineering, In-
partment at Institute of Technology, Nirma Uni- stitute of Technology, Nirma University, Ahmed-
versity, Ahmedabad, Gujarat, India. He is visit- abad, Gujarat, India. She received M.Tech from
ing Professor in Jan Wyzykowski University in Jawaharlal Nehru University, Delhi, India in 2012.
Polkowice, Poland and University of Pitesti in Her research interest includes big data analytics,
Pitesti, Romania. He received B.Tech in 2002 from smart grid, blockchain technology and cloud com-
Kurukshetra University, India, M.Tech (Honor’s) puting.
in 2009 from Guru Gobind Singh Indraprastha
University, Delhi, India and Ph.D. in 2016 with
specialization in Wireless Sensor Network. He has authored or coauthored
more than 100 technical research papers published in leading journals
and conferences from the IEEE, Elsevier, Springer, Wiley, etc. Some of
his research findings are published in top cited journals such as IEEE
Transactions on TVT, IEEE Transactions on Industrial Informatics, Applied
Soft Computing, Journal of Network and Computer Application, Pervasive PRADEEP KUMAR SINGH is currently work-
and Mobile Computing, International Journal of Communication System, ing as Assistant Professor (Senior Grade) in De-
Telecommunication System, Computer and Electrical Engineering and IEEE partment of CSE at Jaypee University of Informa-
Systems Journal. He has also published three edited/authored books with tion Technology (JUIT), Waknaghat, H.P. He has
International/National Publishers. He has guided many students leading to completed his Ph.D. in Computer Science & En-
M.E./M.Tech and guiding students leading to Ph.D. He is Associate Editor gineering from Gautam Buddha University (State
of IJCS, Wiley and Security and Privacy Journal, Wiley. His current interest Government University), Greater Noida, UP, In-
includes Wireless Sensor Networks, Fog Computing, Smart Grid, IoT, and dia. He received his M.Tech. (CSE) with Distinc-
Blockchain Technology. He was invited as Guest Editors/Editorial Board tion from GGSIPU , New Delhi, India. Dr. Singh
Members of many International Journals, invited for keynote Speaker in is having life membership of Computer Society of
many International Conferences held in Asia and invited as Program Chair, India (CSI), Life Member of IEI and promoted to Senior Member Grade
Publications Chair, Publicity Chair, and Session Chair in many International from CSI and ACM. He is Associate Editor of International Journal of
Conferences held in North America, Europe, Asia and Africa. He has been Information Security and Cybercrime (IJISC) a scientific peer reviewed
awarded best research paper awards from IEEE GLOBECOM 2018, IEEE journal from Romania. He has published nearly 85 research papers in various
ICC 2019, and Springer ICRIC-2019. International Journals and Conferences of repute. He has received three
sponsored research projects grant from Govt. of India and Govt. of HP worth
Rs 25 Lakhs. He has edited total 8 books from Springer and Elsevier and
also edited several special issues for SCI and SCIE Journals from Elsevier
and IGI Global. He has Google scholar citations 401, H-index 12 and i-10
Index 15 in his account.
VOLUME 4, 2016 15
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.