2021
DOI: 10.1016/j.ipm.2020.102393
|View full text |Cite
|
Sign up to set email alerts
|

PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 81 publications
(24 citation statements)
references
References 39 publications
0
24
0
Order By: Relevance
“…The conducted experiments show that the proposed algorithm has noticeable enhancements with respect to privacy, total execution time, and network load. However, the proposed algorithm is a static scheduling algorithm that assumes all tasks have the same arrival time [31].…”
Section: Task Scheduling In the Cloud-fog Computing Environmentmentioning
confidence: 99%
“…The conducted experiments show that the proposed algorithm has noticeable enhancements with respect to privacy, total execution time, and network load. However, the proposed algorithm is a static scheduling algorithm that assumes all tasks have the same arrival time [31].…”
Section: Task Scheduling In the Cloud-fog Computing Environmentmentioning
confidence: 99%
“…In recent years, blockchain technology has become increasingly prominent, many scholars believe that this technology has different potential applications in any industry, market, institution or government organization ( Berdik et al., 2021 ). At present, the application domains of blockchain include intelligent social applications ( Esposito et al., 2021 ), intelligent Internet of vehicles transportation ( Oham et al., 2021 ; Khalid et al., 2021 ; Campanile et al., 2021 ), cloud computing and storage ( Li et al., 2020 ; Baniata et al., 2021 ), and terminal storage technology and Internet of things system ( Yu et al., 2021 ; Zhao et al., 2020 ). The application of blockchain traceability mainly focuses on supply chains ( Leng et al., 2019 ; Ahmed & Broek, 2017 ; Queiroz & Fosso Wamba, 2019 ), fake-proof queries of healthcare product safety ( Tanwar et al., 2020 ; Hardin & Kotz, 2021 ), and copyright tracing ( Jing et al., 2021 ).…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, BC nodes perform the tasks that were sent to the BC network by the fog, which originally were requested by task requester end-users. Further, the fog can control the privacy preservation of data and incentivize BC nodes in the form of digital currency, as in Baniata, Anaqreh & Kertesz (2021) . To be specific, BC nodes can be further sub-categorized according to the scenario to be simulated.…”
Section: Bc Architectural Elementsmentioning
confidence: 99%