31 research outputs found

    LightChain: A DHT-based Blockchain for Resource Constrained Environments

    Get PDF
    As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT). The existing blockchain solutions have downsides in communication and storage efficiency, convergence to centralization, and consistency problems. In this paper, we propose LightChain, which is the first blockchain architecture that operates over a Distributed Hash Table (DHT) of participating peers. LightChain is a permissionless blockchain that provides addressable blocks and transactions within the network, which makes them efficiently accessible by all the peers. Each block and transaction is replicated within the DHT of peers and is retrieved in an on-demand manner. Hence, peers in LightChain are not required to retrieve or keep the entire blockchain. LightChain is fair as all of the participating peers have a uniform chance of being involved in the consensus regardless of their influence such as hashing power or stake. LightChain provides a deterministic fork-resolving strategy as well as a blacklisting mechanism, and it is secure against colluding adversarial peers attacking the availability and integrity of the system. We provide mathematical analysis and experimental results on scenarios involving 10K nodes to demonstrate the security and fairness of LightChain. As we experimentally show in this paper, compared to the mainstream blockchains like Bitcoin and Ethereum, LightChain requires around 66 times less per node storage, and is around 380 times faster on bootstrapping a new node to the system, while each LightChain node is rewarded equally likely for participating in the protocol

    Dynamic QoS/QoE-aware reliable service composition framework for edge intelligence

    Get PDF
    Edge intelligence has become popular recently since it brings smartness and copes with some shortcomings of conventional technologies such as cloud computing, Internet of Things (IoT), and centralized AI adoptions. However, although utilizing edge intelligence contributes to providing smart systems such as automated driving systems, smart cities, and connected healthcare systems, it is not free from limitations. There exist various challenges in integrating AI and edge computing, one of which is addressed in this paper. Our main focus is to handle the adoption of AI methods on resource-constrained edge devices. In this regard, we introduce the concept of Edge devices as a Service (EdaaS) and propose a quality of service (QoS) and quality of experience (QoE)-aware dynamic and reliable framework for AI subtasks composition. The proposed framework is evaluated utilizing three well-known meta-heuristics in terms of various metrics for a connected healthcare application scenario. The experimental results confirm the applicability of the proposed framework. Moreover, the results reveal that black widow optimization (BWO) can handle the issue more efficiently compared to particle swarm optimization (PSO) and simulated annealing (SA). The overall efficiency of BWO over PSO is 95%, and BWO outperforms SA with 100% efficiency. It means that BWO prevails SA and PSO in all and 95% of the experiments, respectively

    A Hybrid Edge-assisted Machine Learning Approach for Detecting Heart Disease

    Get PDF
    Various resources are provided by cloud computing over the Internet, which enable plenty of applications to be employed to offer different services for industries. However, cloud computing due to the relying on a central server/datacenter has limitations such as high latency and response time, which are so crucial in real time applications like healthcare systems. To solve this, edge computing paradigm paves the way and provides pioneering solutions by moving the computational and storage resources closer to the end users. Edge computing by facilitating the real-time applications becomes more suitable for healthcare systems. This paper uses edge technology for detecting heart disease in patients utilizing a hybrid machine learning method. Although there exist some works in this area, there is still a need for improving the prediction accuracy. To this end, this paper proposes a meta-heuristic-based feature selection method using Black Widow Optimization (BWO) algorithm, and then, applies different classifiers on the selected features. The experimental results show that AdaBoost classifier along with BWO-based feature selection by 90.11 % accuracy outperforms other experimental methods, such as KNN, SVM, DT, and RF

    SynergyGrids: blockchain-supported distributed microgrid energy trading

    Get PDF
    Growing intelligent cities is witnessing an increasing amount of local energy generation through renewable energy resources. Energy trade among the local energy generators (aka prosumers) and consumers can reduce the energy consumption cost and also reduce the dependency on conventional energy resources, not to mention the environmental, economic, and societal benefits. However, these local energy sources might not be enough to fulfill energy consumption demands. A hybrid approach, where consumers can buy energy from both prosumers (that generate energy) and also from prosumer of other locations, is essential. A centralized system can be used to manage this energy trading that faces several security issues and increase centralized development cost. In this paper, a hybrid energy trading system coupled with a smart contract named SynergyGrids has been proposed as a solution, that reduces the average cost of energy and load over the utility grids. To the best of our knowledge, this work is the first attempt to create a hybrid energy trading platform over the smart contract for energy demand prediction. An hourly energy data set has been utilized for testing and validation purposes. The trading system shows 17.8% decrease in energy cost for consumers and 76.4% decrease in load over utility grids when compared with its counterparts

    Integrita: Protecting View-Consistency in Online Social Network with Federated Servers

    Get PDF
    Current designs of Online Social Networks (OSN) deploy centralized architecture where a central OSN provider handles all the users’ read and write requests over the shared data (e.g., Facebook wall or a group page). The historical incidents demonstrate that such centralization is leveraged for censorship and violating view consistency; a corrupted provider deliberately displays different views of the shared data to the users. Integrita provides a data-sharing mechanism that protects view consistency by replacing the centralized architecture with the federated-server model consisting of N malicious providers, N − 1 of which can be colluding. The state of the shared data is modeled by an append-only data structure, stored at the servers side, which contains the history of all the operations performed by the users. The consistency of users’ views towards shared data depends on their accessibility to the intact log of operations. Integrita guarantees that the servers cannot manipulate the log without being detected by the users. Unlike the state-of-the-art, Integrita accomplishes this neither by using storage inefficient data replication nor by requiring users to exchange their views. Every user, without relying on the presence of other users, can verify whether his operation has been added to the log and is visible to the rest of the users. We introduce and achieve a new level of view consistency named q-detectable consistency, where any inconsistency between users’ views cannot remain undetected for more than q operations where q is a function of the number of the servers. This level of consistency is stronger than what centralized counterparts offer. Also, our proposal reduces the storage overhead imposed by replication-based solutions by the multiplicative factor of 1/N. Furthermore, the application of Integrita is not limited to OSNs, and can be integrated into any log-based systems e.g., versioning control system as well
    corecore