2020 IEEE Intl Conf on Parallel &Amp; Distributed Processing With Applications, Big Data &Amp; Cloud Computing, Sustainable Com 2020
DOI: 10.1109/ispa-bdcloud-socialcom-sustaincom51426.2020.00061
|View full text |Cite
|
Sign up to set email alerts
|

Multi-layer Access Control Mechanism based on Blockchain for Mobile Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…These features cannot satisfy the necessities of safe data accessing to sustain different edge computing domains. In order to address deficiencies, this article proposes a Blockchain‐based Multi‐layer Access Control mechanism (BMAC) 11 . The security check is assigned to all the resources allocated in the dataset.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…These features cannot satisfy the necessities of safe data accessing to sustain different edge computing domains. In order to address deficiencies, this article proposes a Blockchain‐based Multi‐layer Access Control mechanism (BMAC) 11 . The security check is assigned to all the resources allocated in the dataset.…”
Section: Literature Surveymentioning
confidence: 99%
“…In order to address deficiencies, this article proposes a Blockchain-based Multi-layer Access Control mechanism (BMAC). 11 The security check is assigned to all the resources allocated in the dataset. Further, an InfoMap-based algorithm is created to perform user grouping specified on credibility.…”
Section: Deep Learning-based Techniquesmentioning
confidence: 99%
“… Queralta et al (2020) uses evolutionary game strategy to study the problem of multi-user computing offloading in dynamic environments. Finally, Xu et al (2020) , Huang et al (2022) , and Hou et al (2020) exploits the mobility of UAVs to solve the low mobility problem of edge servers ( Queralta et al, 2020 ; Xu et al, 2020 ; Huang et al, 2022 ; Hou et al, 2020 ).…”
Section: Related Workmentioning
confidence: 99%
“…(A) Proof of Work (PoW): This work first proposed the idea of Proof of Work to increase the cost of spammers by calculating a specific mathematical problem ( Takahashi, Tanaka & Kawamura, 2015 ). The PoW consensus mechanism was first introduced in the article in 1999, which also laid the foundation for the consensus mechanism used in Bitcoin proposed by Satoshi Nakamoto in later generations ( Hou et al, 2020 ). Proof of work is one of the most typical algorithms in blockchain consensus mechanisms, such as the mining process in Bitcoin.…”
Section: Consensus Mechanism For Block Chainmentioning
confidence: 99%
See 1 more Smart Citation