Blockchain-Enabled Access Management System for Edge Computing
نویسندگان
چکیده
In the post-cloud era, edge computing is a new paradigm with data processed at of network, which can process close to end-user in real time and offload cloud task intelligently. Meanwhile, decentralization, tamper-proof anonymity blockchain technology provide trusted environment for computing. However, it does raise considerable concerns security, privacy, fault-tolerance so on. For example, identity authentication access control rely on third parties, heterogeneous devices different vendors IoT, leading security privacy risks, etc. How combine advantages two has become highlight academic research, especially issue secure resource management. Comprehensive involve all aspects platform, data, application control. In. this paper, architecture behavior an Access Management System (AMS) proof concept (PoC) prototype are proposed Color Petri Net (CPN) model. The domains organically connected by interfaces interactions. simulation operation, activity role association proves feasibility effectiveness AMS. instances platform business control, database services, IOT hub service run Advantech WISE-PaaS through User Account Authentication (UAA). Finally, fine-grained distributed be realized help attribute. Namely, smart contracts used register, broadcast, revoke authorization, as well create specific transactions define policies.
منابع مشابه
Edge Computing Resource Management and Pricing for Mobile Blockchain
The mining process in blockchain requires solving a proof-of-work puzzle, which is resource expensive to implement in mobile devices due to the high computing power and energy needed. In this paper, we, for the first time, consider edge computing as an enabler for mobile blockchain. In particular, we study edge computing resource management and pricing to support mobile blockchain applications ...
متن کاملOptimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain
As the core issue of blockchain, the mining requires solving a proof-of-work puzzle, which is resource expensive to implement in mobile devices due to high computing power needed. Thus, the development of blockchain in mobile applications is restricted. In this paper, we consider the edge computing as the network enabler for mobile blockchain. In particular, we study optimal pricing-based edge ...
متن کاملOptimal Auction For Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach
Blockchain has recently been applied in many applications such as bitcoin, smart grid, and Internet of Things (IoT) as a public ledger of transactions. However, the use of blockchain in mobile environments is still limited because the mining process consumes too much computing and energy resources on mobile devices. Edge computing offered by the Edge Computing Service Provider can be adopted as...
متن کاملWhen Mobile Blockchain Meets Edge Computing: Challenges and Applications
Blockchain, as the backbone technology of the current popular Bitcoin digital currency, has become a promising decentralized approach for resource and transaction management. Although blockchain has been widely adopted in many applications, e.g., finance, healthcare, and logistics, its application in mobile environments is still limited. This is due to the fact that blockchain users need to sol...
متن کاملBlockchain Enabled Privacy Audit Logs
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10091000