Security and Device Control Method for Fog Computer using Blockchain

Junhyeon Jeong, Bo Youn Kim, J. Jang
{"title":"Security and Device Control Method for Fog Computer using Blockchain","authors":"Junhyeon Jeong, Bo Youn Kim, J. Jang","doi":"10.1145/3209914.3209917","DOIUrl":null,"url":null,"abstract":"Fog computing has emerged due to the problem that it becomes difficult to store every data to the cloud system as the number of Internet of Things increases. In this fog computing, a vast amount of data generated from the Internet of Things is transmitted to the cloud system located at a remote place, and is processed by a fog computer such as a sensor or a router located nearby, so that only the necessary data is transmitted to the cloud system. However, the above-mentioned fog computer has some drawbacks like being shut down due to an attack by a malicious user in advance, and a method of processing when a fog computer is down or restored. In this paper we describe a fog computing with blockchain that enables fog computers to share transaction generated by processing transaction information of a device controlled by a blockchain method to a security and device control method of a fog computer utilizing the technology. Furthemore by using security properties of blockchain such as authentication, non-repudiation and data integrity, fog computing using blockchain has advantage of security comparing to previous Cloud and fog computing system using centralized database or P2P networks.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Information Science and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3209914.3209917","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Fog computing has emerged due to the problem that it becomes difficult to store every data to the cloud system as the number of Internet of Things increases. In this fog computing, a vast amount of data generated from the Internet of Things is transmitted to the cloud system located at a remote place, and is processed by a fog computer such as a sensor or a router located nearby, so that only the necessary data is transmitted to the cloud system. However, the above-mentioned fog computer has some drawbacks like being shut down due to an attack by a malicious user in advance, and a method of processing when a fog computer is down or restored. In this paper we describe a fog computing with blockchain that enables fog computers to share transaction generated by processing transaction information of a device controlled by a blockchain method to a security and device control method of a fog computer utilizing the technology. Furthemore by using security properties of blockchain such as authentication, non-repudiation and data integrity, fog computing using blockchain has advantage of security comparing to previous Cloud and fog computing system using centralized database or P2P networks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于区块链的雾机安全与设备控制方法
雾计算的出现是因为随着物联网数量的增加,很难将所有数据存储到云系统中。在这种雾计算中,物联网产生的大量数据被传输到位于远处的云系统中,并由位于附近的传感器或路由器等雾机进行处理,从而只将必要的数据传输到云系统中。但是,上述的雾机也有一些缺点,比如被恶意用户提前攻击而关闭,以及雾机宕机或恢复时的处理方法。在本文中,我们描述了一种基于区块链的雾计算,它使雾机能够利用该技术将处理由区块链方法控制的设备的交易信息生成的交易共享给雾机的安全和设备控制方法。此外,通过利用区块链的认证、不可否认性和数据完整性等安全属性,使用区块链的雾计算与以前使用集中式数据库或P2P网络的云和雾计算系统相比,具有安全性优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design and Implementation of Student Information Management System Based On Java Improving RealSense by Fusing Color Stereo Vision and Infrared Stereo Vision for the Visually Impaired Expert Recommendation Based on Collaborative Filtering in Subject Research An Approach for Information Discovery Using Ontology In Semantic Web Content Detecting Phone Theft Using Machine Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1