2018
DOI: 10.1002/cpe.4469
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain‐based fair three‐party contract signing protocol for fog computing

Abstract: SummaryFog computing is a new computing paradigm that can provide flexible resources and services at the edge of network. It is an extension of cloud computing and usually cooperated with cloud computing. Therefore, end users, fog nodes, and cloud servers can form a three‐layer service model in practical application. In this model, they should have an agreement on a service contract, which contains every party's rights and obligations before the beginning of the service. However, due to lack of trust, it will … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(37 citation statements)
references
References 37 publications
0
28
0
Order By: Relevance
“…Blockchain. Blockchain can be regarded as a distributed database based on blockchain technology [22][23][24][25]. It has the characteristics of openness, tamper-resistance, decentralization, and autonomy.…”
Section: 2mentioning
confidence: 99%
“…Blockchain. Blockchain can be regarded as a distributed database based on blockchain technology [22][23][24][25]. It has the characteristics of openness, tamper-resistance, decentralization, and autonomy.…”
Section: 2mentioning
confidence: 99%
“…In 2019, authors of [58] surveyed the smart contract protocols and proposed three-party TTP-Free BC-based smart contract signing protocol in Fog environments. The BC role was to guarantee that all signing parties will reveal their signature or they will lose their deposit as a penalty.…”
Section: F Other Fc-bc Applicationsmentioning
confidence: 99%
“…Else, do (30) Step 5.1. If there were more resources, do (31) (32) if SumStep < Step T then (33) sumStep++; (34) Return to step 1, update the weights between nodes, and recalculate the migration factor; (35) else (36) Migration_flag � false; (37) end if (38) end for (39) Return Migration_flag (40) end for ALGORITHM 1: Constraint protocol checking algorithm. 6 Mobile Information Systems…”
Section: Service Migration Decision Algorithm Based On Mobilementioning
confidence: 99%