scholarly journals Blockchain-Based Secure Storage Management with Edge Computing for IoT

Electronics ◽  
2019 ◽  
Vol 8 (8) ◽  
pp. 828 ◽  
Author(s):  
Nyamtiga ◽  
Sicato ◽  
Rathore ◽  
Sung ◽  
Park

As a core technology to manage decentralized systems, blockchain is gaining much popularity to deploy such applications as smart grid and healthcare systems. However, its utilization in resource-constrained mobile devices is limited due to high demands of resources and poor scalability with frequent-intensive transactions. Edge computing can be integrated to facilitate mobile devices in offloading their mining tasks to cloud resources. This integration ensures reliable access, distributed computation and untampered storage for scalable and secure transactions. It is imperative therefore that crucial issues of security, scalability and resources management be addressed to achieve successful integration. Studies have been conducted to explore suitable architectural requirements, and some researchers have applied the integration to deploy some specific applications. Despite these efforts, however, issues of anonymity, adaptability and integrity still need to be investigated further to attain a practical, secure decentralized data storage. We based our study on peer-to-peer and blockchain to achieve an Internet of Things (IoT) design supported by edge computing to acquire security and scalability levels needed for the integration. We investigated existing blockchain and associated technologies to discover solutions that address anonymity, integrity and adaptability issues for successful integration of blockchain in IoT systems. The discovered solutions were then incorporated in our conceptual design of the decentralized application prototype presented for secure storage of IoT data and transactions.

2018 ◽  
Vol 7 (3.10) ◽  
pp. 18
Author(s):  
Sreelesh N.K ◽  
Santhosh Kumar B J

Cloud computing is a revolutionary computing technique, by which computing resources are provided dynamically via Internet is widely popular. Since the most attractive part of cloud computing is computation outsourcing, it is far beyond enough to just conduct access control. Unfortunately, the data in the cloud is out of user’s control in most cases, privacy risks would rise dramatically due to the access of unauthorized users. The security of the data is the major concern. Coordinating mobile devices into cloud computing is a rising but encouraging illustration. The coordination happens in a cloud based multi-layered client information sharing condition. With the coordination of cloud computing with mobile devices may result in security issues such as information privacy and client rights.The proposed work makes use of a technology using Advanced Hierarchical Attribute Based Encryption (A-HABE) architecture, in which the data storage will be in hierarchical structure and the retrieval of data will also be in the form of access level. Data confidentiality should be guaranteed and the system should be resilient. The secure storage and sharing of data without the fear of an unauthorized access in the cloud can result in growth in many sectors. 


2018 ◽  
Vol 50 (6) ◽  
pp. 1-51 ◽  
Author(s):  
Yaser Mansouri ◽  
Adel Nadjaran Toosi ◽  
Rajkumar Buyya

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Qingqing Xie ◽  
Fan Dong ◽  
Xia Feng

The blockchain technology achieves security by sacrificing prohibitive storage and computation resources. However, in mobile systems, the mobile devices usually offer weak computation and storage resources. It prohibits the wide application of the blockchain technology. Edge computing appears with strong resources and inherent decentralization, which can provide a natural solution to overcoming the resource-insufficiency problem. However, applying edge computing directly can only relieve some storage and computation pressure. There are some other open problems, such as improving confirmation latency, throughput, and regulation. To this end, we propose an edge-computing-based lightweight blockchain framework (ECLB) for mobile systems. This paper introduces a novel set of ledger structures and designs a transaction consensus protocol to achieve superior performance. Moreover, considering the permissioned blockchain setting, we specifically utilize some cryptographic methods to design a pluggable transaction regulation module. Finally, our security analysis and performance evaluation show that ECLB can retain the security of Bitcoin-like blockchain and better performance of ledger storage cost in mobile devices, block mining computation cost, throughput, transaction confirmation latency, and transaction regulation cost.


2022 ◽  
pp. 1-12
Author(s):  
Jingyi Li

Traditional financial data storage methods are prone to data leakage and narrow data coverage. Therefore, this paper proposes a dynamic and secure storage method of financial data based on cloud platform.In order to improve the ability of enterprise data management, the paper constructs a financial cloud computing platform, mining financial data by rough set theory, and analyzing the results of frequent pattern mining of financial data by fuzzy attribute characteristics.According to the granularity theory, the financial data is classified and processed, and the CSA cloud risk model is established to realize the dynamic and secure storage of financial data.The experimental results show that. The maximum data storage delay of this method is no more than 4.1 s, the maximum data leakage risk coefficient is no more than 0.5, the number of data types can reach 30, and the data storage coverage is improved.


Sign in / Sign up

Export Citation Format

Share Document