2021
DOI: 10.48550/arxiv.2111.00416
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

How BlockChain Can Help Enhance The Security And Privacy in Edge Computing?

Jinyue Song,
Tianbo Gu,
Prasant Mohapatra

Abstract: In order to solve security and privacy issues of centralized cloud services, the edge computing network is introduced, where computing and storage resources are distributed to the edge of the network. However, native edge computing is subject to the limited performance of edge devices, which causes challenges in data authorization, data encryption, user privacy, and other fields. Blockchain is currently the hottest technology for distributed networks. It solves the consistent issue of distributed data and is u… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 26 publications
(31 reference statements)
0
1
0
Order By: Relevance
“…However, this situation creates a bottleneck threat due to continuous growth in the process and may cause delays and malfunctions as a result of blockages in network traffic [6]. With these developments, many problem areas that need to be developed in terms of efficiency, security requirements, resource usage and user security have emerged [3,5]. Many IoT devices used to gather information from the environment do not have enough resources to deal with malicious cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%
“…However, this situation creates a bottleneck threat due to continuous growth in the process and may cause delays and malfunctions as a result of blockages in network traffic [6]. With these developments, many problem areas that need to be developed in terms of efficiency, security requirements, resource usage and user security have emerged [3,5]. Many IoT devices used to gather information from the environment do not have enough resources to deal with malicious cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%