2022
DOI: 10.1007/s10586-022-03813-x
|View full text |Cite
|
Sign up to set email alerts
|

Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach

Abstract: It is difficult to manage massive amounts of data in an overlying environment with a single server. Therefore, it is necessary to comprehend the security provisions for erratic data in a dynamic environment. The authors are concerned about the security risk of vulnerable data in a Mobile Edge based distributive environment. As a result, edge computing appears to be an excellent perspective in which training can be done in an Edge-based environment. The combination of Edge computing and consensus approach of Bl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 108 publications
0
1
0
1
Order By: Relevance
“…Integrated BC-FL frameworks present overall formal models, besides the use of others (i.e., Fedtrust [83], AFFIRM [84]), frameworks like Blade-FL and VBFL are underrepresented, suggesting the need for further exploration. Applications span diverse sectors, prominently healthcare (35%), industrial management (30%), smart cities (30%), and others (i.e., smart grid [83], disaster response [86], BC reliability prediction [88], Internet of Battle Things (IoBT) [96], Internet of Drone Things (IoDT) [103], Agriculture [98], MEC [101], Society [105], Gamming [109], Industry 5.0 [114]) (43%) indicating the versatility and potential impact of this integration. Within Cloud Features (EC5), a hybrid cloud deployment model (48%) and container-based cloud server design (43%) stand out, emphasizing flexibility and scalability.…”
Section: ) Srq1 Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Integrated BC-FL frameworks present overall formal models, besides the use of others (i.e., Fedtrust [83], AFFIRM [84]), frameworks like Blade-FL and VBFL are underrepresented, suggesting the need for further exploration. Applications span diverse sectors, prominently healthcare (35%), industrial management (30%), smart cities (30%), and others (i.e., smart grid [83], disaster response [86], BC reliability prediction [88], Internet of Battle Things (IoBT) [96], Internet of Drone Things (IoDT) [103], Agriculture [98], MEC [101], Society [105], Gamming [109], Industry 5.0 [114]) (43%) indicating the versatility and potential impact of this integration. Within Cloud Features (EC5), a hybrid cloud deployment model (48%) and container-based cloud server design (43%) stand out, emphasizing flexibility and scalability.…”
Section: ) Srq1 Resultsmentioning
confidence: 99%
“…Journal [108] 2022 P34 [109] 2022 P35 [110] 2023 P36 [111] 2020 P37 [112] 2023 P38 [113] 2022 P39 [114] 2023 P40…”
Section: B Conducting the Reviewunclassified
“…Traditional cloud computing is difficult to satisfy the needs of IoT devices due to some critical factors such as bandwidth shortages, high operating costs, a lack of real-time services and responses, and a lack of security and privacy because it serves as a general computing system. Despite the fact that edge computing makes computing more practical for smart city applications and beyond, it also poses significant security vulnerabilities by increasing the real-world attack surface regarding weak computation power, heterogeneity of the operating system and communication protocol of edge devices, making it difficult to provide a protective mechanism for edge computing, and attack unawareness because edge devices don't support a user interface or a system to show whether the device is shutdown, malfunctioned, or compromised [24].…”
Section: Edge Computingmentioning
confidence: 99%
“…"As this technology continues to evolve, it has the potential to significantly impact how data-driven decisions are made in healthcare and beyond." [18,21].…”
Section: Automating and Enhancing Supply Chain Processesmentioning
confidence: 99%
“…Access policies will co-evolve with institutional learning and regulatory guidance. But rationalizing identity on blockchain networks promises to balance transparency with confidentiality imperatives across ATMP development pipelines needing accountability [21].…”
Section: Identity and Access Managementmentioning
confidence: 99%