期刊文献+

A Novel GLS Consensus Algorithm for Alliance Chain in Edge Computing Environment

下载PDF
导出
摘要 Edge computing devices are widely deployed.An important issue that arises is in that these devices suffer from security attacks.To deal with it,we turn to the blockchain technologies.The note in the alliance chain need rules to limit write permissions.Alliance chain can provide security management functions,using these functions to meet the management between the members,certification,authorization,monitoring and auditing.This article mainly analyzes some requirements realization which applies to the alliance chain,and introduces a new consensus algorithm,generalized Legendre sequence(GLS)consensus algorithm,for alliance chain.GLS algorithms inherit the recognition and verification efficiency of binary sequence ciphers in computer communication and can solve a large number of nodes verification of key distribution issues.In the alliance chain,GLS consensus algorithm can complete node address hiding,automatic task sorting,task automatic grouping,task node scope confirmation,task address binding and stamp timestamp.Moreover,the GLS consensus algorithm increases the difficulty of network malicious attack.
出处 《Computers, Materials & Continua》 SCIE EI 2020年第10期963-976,共14页 计算机、材料和连续体(英文)
基金 We gratefully acknowledge anonymous reviewers who read drafts and made many helpful suggestions.This work is supported by the National Key Research and Development Program No.2018YFC0807002.
  • 相关文献

参考文献2

二级参考文献24

  • 1F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog Computing and Its Role in the ]nternet of Things" in Proceedings of ACM MCC, pp. 23-26, 2012.
  • 2Luis Miguel Vaquero Gonzalez, Luis Rodero- Merino: Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing. Computer Communication Review (CCR) 44(5):27-32, 2014.
  • 3Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Limin Sun: Fog Computing: Focusing on Mobile Users at the Edge.CoRR abs/1502.01815, 2015 Jiang Zhu, Douglas S. Chan, Mythili.
  • 4Jiang Zhu, Douglas S. Chan, Mythili Suryanarayana Prabhu, Preethi Natarajan, Hao Hu, Flavio Bonomi: Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture. SOSE 2013:320-323, 2013.
  • 5John K. Zao, Tchin Tze Gan, Chun Kai You, Sergio Jose Rodriguez Mendez, Cheng En Chung, Yu Te Wang, Tim Mullen,Tzyy Ping Jung: Augmented Brain Computer Interaction Based on Fog Computing and Linked Data. Intelligent Environments 2014:374-377. 2014.
  • 6Clinton D'Souza, GaiI-Joon Ahn, Marthony Taguinod: Policy-driven security management for fog computing: Preliminary framework and a case study. IRI 2014:16-23, 2014.
  • 7Mohammad Aazam, Eui-Nam Huh: Fog Com- puting and Smart Gateway Based Communication for Cloud of Things. FiCIoud 2014:464-470. 2014.
  • 8Flavio Bonomi, Rodolfo A. Milito, Preethi Natarajan, Jiang Zhu: Fog Computing: A Platform for Internet of Things and Analytics. Big Data and Internet of Things 2014:169-186, 2014.
  • 9Ivan Stojmenovic, Sheng Wen: The Fog Com- puting Paradigm: Scenarios and Security Issues. FedCSIS 2014:1-8, 2014.
  • 10Marcelo Yannuzzi, Rodolfo A. Milito, Ren~ SerraI-Gracia, D. Montero, Mario Nemirovsky: Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing. CAMAD 2014:325-329, 2014.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部