Security Enhancement of IoT and Fog Computing Via Blockchain Applications
نویسندگان
چکیده
Blockchain technology is now becoming highly appealing to the next generation because it better tailored information age. technologies can also be used in Internet of Things (IoT) and fog computing. The development IoT Fog Computing different fields has resulted a major improvement distributed networks. blockchain principle necessitates transparent data storage mechanism for storing exchanging transactions throughout network. In this paper, first, we explained blockchain, its architecture, security. Then view application computing, Generic Security Requirements Computing, discussed applications that enhance Security. Finally, conduct review some recent literature on using improve computing security compare methods proposed literature.
منابع مشابه
Security Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملA Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud....
متن کاملCIoTA: Collaborative IoT Anomaly Detection via Blockchain
Due to their rapid growth and deployment, Internet of things (IoT) devices have become a central aspect of our daily lives. However, they tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can help us secure the IoT devices. However, an anomaly detection model must be trained for a long time in order to capture all benign...
متن کاملLSB: A Lightweight Scalable BlockChain for IoT Security and Privacy
BlockChain (BC) has attracted tremendous attention due to its immutable nature and the associated security and privacy benefits. BC has the potential to overcome security and privacy challenges of Internet of Things (IoT). However, BC is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which are not suited to the IoT context. We propose a ...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF SOFT COMPUTING AND DATA MINING
سال: 2021
ISSN: ['2716-621X']
DOI: https://doi.org/10.30880/jscdm.2021.02.02.003