7 research outputs found

    AI and Blockchain enabled Edge of Things with Privacy Preserving Computation

    Get PDF
    Recent research has brought cloud, edge, and Internet of Things (IoT) technologies together to develop integrated platforms for utilizing resource-rich clouds to support resource-constrained IoT applications. However, their success is limited, in particular, they are lack of efficient intelligence for data processing and service operations as well as dynamic and trustworthy service composition across multi-layers from IoT devices to clouds, which are important for IoT applications. This paper will thus propose an innovative platform for composing smart and trustworthy edges (ROOF (Real-time Onsite Operations Facilitation) plus Fog) of things to support applications ranging from ultra-low delay and lightweight to complex services. To achieve this goal, the research employs the microservice concept to decompose applications into lightweight services located from the edge of things to cloud data centers. Further, inspired by the artificial intelligence and blockchain technologies, this work proposes a novel approach for composing microservices that will provide prosumer-driven, decentralized and autonomous service composition while preserving the privacy of the participating stakeholders

    Blockchain enabled industrial Internet of Things technology

    Get PDF
    The emerging blockchain technology shows promising potential to enhance industrial systems and the Internet of things (IoT) by providing applications with redundancy, immutable storage, and encryption. In the past a few years, many more applications in industrial IoT (IIoT) have emerged and the blockchain technologies have attracted huge amounts of attention from both industrial and academic researchers. In this paper we address the integration of blockchain and IIoT from the industrial prospective. A blockchain enabled IIoT framework is introduced and involved fundamental techniques are presented. Moreover, main applications and key challenges are addressed. A comprehensive analysis for the most recent research trends and open issues is provided associated with the blockchain enabled IIoT

    Next Generation of SDN in Cloud-Fog for 5G and Beyond-Enabled Applications: Opportunities and Challenges

    Get PDF
    In recent years, the number of objects connected to the Internet has significantly increased. Increasing the number of connected devices to Internet is transforming today’s Internet of Things (IoT) into massive IoT of future. It is predicted, in a few years, a high communication and computation capacity will be required to meet demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill part of these requirements by providing data rate of up to Terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constrains. On the other hand, next generation of Software Defined Networking (SDN) with emerging Cloud related technologies (e.g., Fog and Edge computing) can play an important role on supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid Cloud-Fog systems to support 5G and beyond-enabled applications

    TrustChain: A Privacy Preserving Blockchain with Edge Computing

    Get PDF
    Recent advancements in the Internet of Things (IoT) has enabled the collection, processing, and analysis of various forms of data including the personal data from billions of objects to generate valuable knowledge, making more innovative services for its stakeholders. Yet, this paradigm continuously suffers from numerous security and privacy concerns mainly due to its massive scale, distributed nature, and scarcity of resources towards the edge of IoT networks. Interestingly, blockchain based techniques offer strong countermeasures to protect data from tampering while supporting the distributed nature of the IoT. However, the enormous amount of energy consumption required to verify each block of data make it difficult to use with resource-constrained IoT devices, and with real-time IoT applications. Nevertheless, it can expose the privacy of the stakeholders due to its public ledger system even though it secures data from alterations. Edge computing approaches suggest a potential alternative to centralized processing in order to populate real-time applications at the edge and to reduce privacy concerns associated with cloud computing. Hence, this paper suggests the novel privacy preserving blockchain called TrustChain which combines the power of blockchains with trust concepts to eliminate issues associated with traditional blockchain architectures. This work investigates how TrustChain can be deployed in the edge computing environment with different levels of absorptions to eliminate delays and privacy concerns associated with centralized processing, and to preserve the resources in IoT networks

    Preserving Edge Knowledge Sharing Among IoT Services: A Blockchain-Based Approach

    Get PDF
    Edge computational intelligence, integrating artificial intelligence (AI) and edge computing into Internet of Things (IoT), will generate many scattered knowledge. To enable auditable and delay-sensitive IoT services, these knowledge will be shared among decentralized intelligent network edges (DINEs), end users, and supervisors frequently. Blockchain has a promising ability to provide a traceable, privacy-preserving and tamper-resistant ledger for sharing edge knowledge. However, due to the complicated environments of network edges, knowledge sharing among DINEs still faces many challenges. Firstly, the resource limitation and mobility of DINEs impede the applicability of existing consensus tricks (e.g., Poof of Work, Proof of Stake, and Paxos) of blockchain. Secondly, the adversaries may eavesdrop the content of edge knowledge or entice the blockchain to forks using some attacking models (like man-in-the-middle attack, denial of services, etc.). In this article, an user-centric blockchain (UCB) framework is proposed for preserving edge knowledge sharing in IoT. Significant superiorities of UCB benefit from the proof of popularity (PoP) consensus mechanism, which is more energy-efficient and fast. Security analysis and experiments based on Raspberry Pi 3 Model B demonstrate its feasibility with low block generating delay and complexity

    Exploiting the IoT Potential of Blockchain in the IEEE P1931.1 ROOF Standard

    No full text
    corecore