A Novel Direct, Indirect and Mutual Trust-Based Blockchain Modeling for Validation of Data Reliability in Integrated Edge Computing Environment
International Journal of Electronics and Communication Engineering |
© 2024 by SSRG - IJECE Journal |
Volume 11 Issue 7 |
Year of Publication : 2024 |
Authors : D. Jayakumar, K. Santhosh Kumar |
How to Cite?
D. Jayakumar, K. Santhosh Kumar, "A Novel Direct, Indirect and Mutual Trust-Based Blockchain Modeling for Validation of Data Reliability in Integrated Edge Computing Environment," SSRG International Journal of Electronics and Communication Engineering, vol. 11, no. 7, pp. 169-179, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I7P117
Abstract:
The tremendous growth of the Internet of Things has led to a rapid increase in data. When there is voluminous data to be processed, the speed of data retrieval, response time, and storage becomes a huge problem. To solve this issue, the integration of edge computing and blockchain technology is proposed in this study. Edge computing and blockchain are two dominants reigning in the data world today. Their integration will eventually result in a paradigm shift from centralized data management to a more decentralized form. While integrating them, security and trust become a problem because, in edge computing, different nodes participate in the link, which may follow different protocols. To resolve this issue, authors propose two blockchain trust models, namely the direct and indirect trust-based blockchain model and the mutual trust chain-based blockchain model. The proposed models are evaluated against standard blockchain techniques like Bitcoin, Ethereum, and Hyperledger Fabric, and it has been proven that the proposed mutual trust chain algorithm outperforms all the other existing technologies. The performance metrics such as throughput, efficiency, packet delivery rate, execution time, delay, packet drop ratio, etc., are calculated under the introduction of attacks like interference and eavesdropping, malicious code injection, and sleep deprivation attacks to validate the reliability of data in an edge computing environment. The proposed algorithms have higher scalability, lower latency, and better efficiency.
Keywords:
Blockchain, Trust, Edge computing, Data reliability, Internet of Things (IoT), Security attacks.
References:
[1] Qurat-ul-Ain Arshad et al., “Blockchain-Based Decentralized Trust Management in IoT: Systems, Requirements and Challenges,” Complex & Intelligent Systems, vol. 9, no. 6, pp. 6155-6176, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Davide Ferraris et al., “A Survey on IoT Trust Model Frameworks,” The Journal of Supercomputing, vol. 80, no. 6, pp. 8259–8296, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Wenjuan Li et al., “Blockchain-Based Trust Management in Cloud Computing Systems: A Taxonomy, Review and Future Directions,” Journal of Cloud Computing, vol. 10, no. 1, pp. 1-34, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Seyoung Huh, Sangrae Cho, and Soohyung Kim, “Managing IoT Devices Using Blockchain Platform,” 2017 19th International Conference on Advanced Communication Technology, PyeongChang, Korea (South), pp. 464-467, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Simon Johnson et al., “Intel Software Guard Extensions: EPID Provisioning and Attestation Services,” White Paper, vol. 1, pp. 1-10, 2016.
[Google Scholar] [Publisher Link]
[6] A.S.M. Kayes et al., “Achieving Security Scalability and Flexibility Using Fog-Based Context-Aware Access Control,” Future Generation Computer Systems, vol. 107, pp. 307-323, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Abduljaleel Al-Hasnawi, Steven M. Carr, and Ajay Gupta, “Fog-Based Local and Remote Policy Enforcement for Preserving Data Privacy in the Internet of Things,” Internet of Things, vol. 7, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Arwa Alrawais et al., “An Attribute-Based Encryption Scheme to Secure Fog Communications,” IEEE Access, vol. 5, pp. 9131-9138, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Shaoyong Guo et al., “Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1972-1983, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Sidra Malik et al., “Trustchain: Trust Management in Blockchain and IoT Supported Supply Chains,” 2019 IEEE International Conference on Blockchain, Atlanta, GA, USA, pp. 184-193, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Kobra Mabodi et al., “Multi-Level Trust-Based Intelligence Schema for Securing of Internet of Things (IoT) Against Security Threats Using Cryptographic Authentication,” The Journal of Supercomputing, vol. 76, pp. 7081-7106, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Mohamed Tahar Hammi et al., “Bubbles of Trust: A Decentralized Blockchain-Based Authentication System for IoT,” Computers & Security, vol. 78, pp. 126-142, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Konstantinos Christidis, and Michael Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292-2303, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ali Dorri, Salil S. Kanhere, and Raja Jurdak, “Towards an Optimized Blockchain for IoT,” 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation, Pittsburgh, PA, USA, pp. 173-178, 2017.
[Google Scholar] [Publisher Link]
[15] Thomas Hardjono, and Ned Smith, “Cloud-Based Commissioning of Constrained Devices Using Permissioned Blockchains,” Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, Xi'an China, pp. 29-36, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Sayed Hadi Hashemi et al., “World of Empowered IoT Users,” 2016 IEEE First International Conference on Internet-of-Things Design and Implementation, Berlin, Germany, pp. 13-24, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Lichen Cheng et al., “Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain,” ACM Transactions on Internet Technology, vol. 21, no. 1, pp. 1-19, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Ben Amor, Mohamed Abid, and Aref Meddeb, “CASK: Conditional Authentication and Session Key Establishment in Fog-assisted Social IoT Network,” 2019 15th International Wireless Communications & Mobile Computing Conference, Tangier, Morocco, pp. 114-119, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Chirag Modi et al., “A Survey of Intrusion Detection Techniques in Cloud,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42-57, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Cong Zuo et al., “CCA-Secure ABE with Outsourced Decryption for Fog Computing,” Future Generation Computer Systems, vol. 78, no. 2, pp. 730–738, 2018.
[CrossRef] [Google Scholar] [Publisher Link]