Desktop version
Home
Computer Science
>>
Blockchain-enabled Fog and Edge Computing: Concepts, Architectures, and Applications
I. Fundamental concepts and applications of blockchain-enabled fog and edge computing
From blockchain Internet of Things (B-IoT) towards decentralising the Tactile Internet
INTRODUCTION
BLOCKCHAIN TECHNOLOGIES
Ethereum versus Bitcoin blockchains
Decentralised autonomous organisations (DAOs)
BLOCKCHAIN loT AND EDGE COMPUTING
Blockchain IoT (В-loT): Recent progress and related work
Blockchain-enabled edge computing
THE IEEE P1918.1 TACTILE INTERNET
The Tactile Internet: Key principles
Human-agent-robot teamwork
Low-latency FiWi-enhanced LTE-A HetNets with Al-enhanced MEC
Low-latency FiWi-enhanced LTE-A HetNets
Al-enhanced MEC: Pushing Al to the edge
DECENTRALISING THE TACTILE INTERNET
Decentralised edge intelligence
Crowdsourcing: Expanding the HO workforce
BLOCKCHAIN, Al, AND HUMAN INTELLIGENCE: THE PATH FORWARD
Cognitive-assistance-based intelligence amplification
HITL hybrid-augmented intelligence
The rise of the decentralised self-organising cooperative
Nudging towards human augmentation
OPEN CHALLENGES AND FUTURE WORK
CONCLUSIONS
REFERENCES
Blockchain concepts, architectures, and Smart city applications in fog and edge computing environments
INTRODUCTION AND OVERVIEW
BACKGROUND AND MOTIVATION
loT ecosystem
Edge computing in the IoT ecosystem
loT security concepts
IoT ARCHITECTURES WITH EMPHASIS ON THE EDGE STRUCTURES
Architectural concepts
The open systems loT reference model
G loT COMMUNICATION TECHNOLOGIES
Wireless technologies for the loT
G wireless technologies for the IoT
SMART CITY CONCEPTS AND COMMON SMART CITY APPLICATIONS
Urban and city trends
Smart city applications of the IoT
Formal definition of a Smart city
SUMMARY OF APPLICABLE BLOCKCHAIN CONCEPTS
Basic blockchain concepts
Data integrity using blockchains
Possible weaknesses of blockchains
SURVEY OF SMART CITY loT APPLICATIONS THAT ARE OR WILL BENEFIT FROM BLOCKCHAINS
Sample loT blockchain applications
Sample IoT blockchain applications for Smart cities
loT security blockchain applications
Blockchain implementation modes in the loT
Specific Smart city blockchain applications
E-health
Smart grid
Logistics
Surveillance
Municipal smart service
Economic development
Vehicular applications
Insurance and banking
Device management
FUTURE RESEARCH AREAS
REFERENCES
A Blockchain-enabled edge supported e-challan mechanism for content-centric Internet of Vehicles
INTRODUCTION
VANETs versus IoV
Content-centric IoV
Blockchain with edge computing
LITERATURE SURVEY
Content-centric Internet of Vehicles (CC-IoV)
Blockchain-enabled CC-loV
Blockchain-enabled loV
Blockchain-enabled CCN
Blockchain-enabled CC-loV
RESEARCH MOTIVATION AND PROBLEM STATEMENT
PROPOSED BLOCKCHAIN-BASED EDGE MECHANISM FOR CC-loV
Generating packets
Speeding vehicle info delivery
Reporting an offense
Validation of offense
Reply of offense validation
System workflow of scheme
RESULTS AND DISCUSSIONS
Simulation environment
Results and analysis
Time from offense to Blockchain transaction
Packets overhead
Trust in offense processing
Financial gain
CONCLUSION
FUTURE WORK
APPENDIX
REFERENCES
II. Security and privacy issues in blockchain-enabled fog and edge computing
Hardware-primitive-based blockchain for IoT in fog and edge computing
INTRODUCTION
Internet of Things
Blockchain
Transaction
Signing a transaction
Reaching consensus: Proof-of-Work
Physical unclonable functions
PUF-BASED BLOCKCHAIN PROTOCOLS FOR IOT IN FOG AND EDGE COMPUTING
Data provenance protocols
The setup phase
The data transfer phase
Performance analysis
Centralised versus decentralised architecture
Data provenance and data integrity
Distributed consensus
Security analysis
Assumptions
Threat model
Security proofs
Formal proofs
CONCLUSION
APPENDIX
REFERENCES
On blockchain and its complementarity with fog computing to secure management systems
INTRODUCTION
loT CONTEXT
FOG COMPUTING
Fog computing strengths and weaknesses
BLOCKCHAINS
What is blockchain structure?
How does blockchain work?
What are blockchain key features?
What are blockchain performance and security weaknesses?
What is a smart contract?
BLOCKCHAIN AND FOG COMPLEMENTARITY
PROPOSITION
CONCLUSION
REFERENCES
Security and privacy issues of blockchain-enabled fog and edge computing
INTRODUCTION
CLOUD-TO-THING CONTINUUM BY MEANS OF FOG AND EDGE COMPUTING
Requirements
BLOCKCHAIN
Transaction process
Types of nodes in the blockchain network
Types of blockchain
Blockchain main ingredients
Consensus mechanisms
Cryptography
Smart contract
Privacy
Blockchain characteristics
Challenges
Scalability
Security
Law
BLOCKCHAIN AND FOG AND EDGE COMPUTING: A POSSIBLE COOPERATION
Reference architecture
Consensus mechanisms
Security advantages
Privacy advantages
Resource management using blockchain
Challenges of the incorporation
FUTURE DIRECTIONS
CONCLUSIONS
REFERENCES
Scaling edge computing security with blockchain technologies
EDGE SECURITY CHALLENGES
Introducing security at the edge
Edge architectural challenges
Scalability
Security
Devices computational capacity
The cloud as a secure architecture ‘no longer feasible’
BLOCKCHAIN IN THE SECURITY ARENA
Why to use blockchain
The challenges
Blockchain scalability issues
Blockchain data sharing
BLOCKCHAIN ARCHITECTURE
Architectures
Permissionless
Permissioned
Hybrid
Consensus
Public algorithms
Permissioned algorithms
New transaction acceptance
BLOCKCHAIN SERVICES IN EDGE COMPUTING
Secure device profiling
Authentication
Integrity of the data provided by the edge
Validation
Gateways
BLOCKCHAIN VERSUS CLOUD SOLUTIONS APPLIED TO EDGE SCENARIOS
Authentication model
Secure edge device profiling model
Integrity of the data provided by the edge model
CONCLUSIONS
ACKNOWLEDGMENT
REFERENCES
Blockchain based solutions for achieving secure storage in fog computing
INTRODUCTION
BACKGROUND
IoT overview
Blockchain overview
Blockchain versions
Public and private blockchains
Fog and edge overview
Fog versus edge computing
Fog computing structure
EMERGING ISSUES AND CHALLENGES
loT general challenges
Quality of Service (QoS)
Security and privacy
Storage and manipulating the huge amount of data
Energy consumption
Blockchain general challenges
Storage capacity and scalability
Security: Weaknesses and threats
Anonymity and data privacy
Wasted resources
Technological challenges: Throughput, latency, size, and bandwidth
Fog and edge challenges
Scalability and adaptability
Heterogeneity, efficiency, and performance
Security and privacy
BLOCKCHAIN FOR EDGE AND FOG
Advantages
Issues
Security and data integrity issues
Scalability and storage capacity issues
Processing power and time
Legal and compliance
SECURITY IN BLOCKCHAIN-BASED FOG COMPUTING SYSTEMS: SOLUTIONS
Smart home solution
Smart health care
Smart vehicular
CONCLUSION
REFERENCES
Differential privacy for edge computing-based smart grid operating over blockchain
INTRODUCTION
Comparison of privacy-preserving techniques
Encryption-based privacy
PRELIMINARIES OF PRIVATE SMART GRID EDGE COMPUTING OVER BLOCKCHAIN
Smart grid
Fog and edge computing
Blockchain
Differential privacy
Variants of differential privacy
LITERATURE REVIEW
Blockchain work considering edge computing and its privacy
Blockchain work considering edge computing and smart grid
Blockchain work considering smart grid and its privacy
DIFFERENTIALLY PRIVATE RER MONITORING FOR EDGE-COMPUTING-BASED SMART GRID OPERATING OVER BLOCKCHAIN
System model
Design goals of BDOR strategy
BDOR strategy adversary model
Proposed algorithm and flow chart
PERFORMANCE EVALUATION
Mean absolute and mean relative error
CHALLENGES AND FUTURE RESEARCH DIRECTIONS
Privacy issues
Security issues
Consensus mechanism
Energy efficiency and throughput
Machine learning
CONCLUSION
REFERENCES
>>
Related topics
Academic library - free online college e textbooks - info{at}ebrary.net - © 2014 - 2023