2018 IEEE Intl Conf on Parallel &Amp; Distributed Processing With Applications, Ubiquitous Computing &Amp; Communications, Big 2018
DOI: 10.1109/bdcloud.2018.00056
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Offloading Approach in Fog Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 17 publications
0
18
0
Order By: Relevance
“…The second computational difficulty results from the assumption that confidence fluctuates over time. Reference [18] proposes a Blockchain-based approach to solve this issue. In the case of wireless sensor networks, the method measures a node's trustworthiness.…”
Section: Trust Management Based On Blockchainmentioning
confidence: 99%
“…The second computational difficulty results from the assumption that confidence fluctuates over time. Reference [18] proposes a Blockchain-based approach to solve this issue. In the case of wireless sensor networks, the method measures a node's trustworthiness.…”
Section: Trust Management Based On Blockchainmentioning
confidence: 99%
“…The proposed scheme deployed three different BCs; one in the fog server recording the failed handover attempts, the second controls the mobility anchors and access routers, while the third embraces the mobile entities' information. Authors of [40] presented an approach to enable mobile end-users to offload their computations to fog nodes while moving. The proposed approach used a Spacial-Temporal Database with R-Tree data structure, a PoW-based BC, and suggested FogCoin tokens, all deployed for rewarding system entities for their computation power.…”
Section: B Smart Mobile Devices Applications (Smds)mentioning
confidence: 99%
“…In [34], Tang et al consider the scenario in the fog computing offload environment in which mobile users may mistakenly transfer computing tasks to nearby fog servers that are attacked, causing a series of privacy and security issues. In response to this challenge, the authors introduced blockchain technology into the fog computing environment and sought to check the accuracy and authenticity of the fog server performing the unloading in a short time.…”
Section: Related Workmentioning
confidence: 99%
“…In the above research, scholars mostly use the characteristics of collective maintenance, traceability, and high security in blockchain technology to solve security problems in the fog computing environment [33][34][35]38,40], and resource allocation issues [39,42]. Some scholars have also studied the problem of the blockchain itself so that it can better serve cloud computing or fog computing [37].…”
Section: Related Workmentioning
confidence: 99%