2020
DOI: 10.32604/cmc.2020.07425
|View full text |Cite
|
Sign up to set email alerts
|

Edge Computing-Based Tasks Offloading and Block Caching for Mobile Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…Yan et al puts forward a blockchain framework based on mobile edge computing, in which the blockchain mining tasks can be offloaded to nearby the edge computing service providers, and the encrypted hashes of blocks can be cached in the edge computing service providers. Moreover, they model the process of offloading and caching to ensure that both edge nodes and edge computing service providers obtain the maximum profit [26]. Nguyen et al presents a new privacy-preserving Secure Ant Colony optimization with multi-kernel support vector machine with elliptical curve cryptosystem for secure and reliable IoT data sharing based on blockchain to ensure protection and integrity of data [27].…”
Section: Related Researchmentioning
confidence: 99%
“…Yan et al puts forward a blockchain framework based on mobile edge computing, in which the blockchain mining tasks can be offloaded to nearby the edge computing service providers, and the encrypted hashes of blocks can be cached in the edge computing service providers. Moreover, they model the process of offloading and caching to ensure that both edge nodes and edge computing service providers obtain the maximum profit [26]. Nguyen et al presents a new privacy-preserving Secure Ant Colony optimization with multi-kernel support vector machine with elliptical curve cryptosystem for secure and reliable IoT data sharing based on blockchain to ensure protection and integrity of data [27].…”
Section: Related Researchmentioning
confidence: 99%
“…Abrading and termination pay might be contemplated as dual different practices can directly expand the cloud systems' user-friendliness and flexibility. In addition, some more block-chain and cloud related work can be read and referred to the references [20,[31][32][33][34][35][36][37][38][39]43,44]. The CPABE practice leads to several key problems when installed at cloud consumer's information interchange policy construction.…”
Section: Related Workmentioning
confidence: 99%
“…In this QKD approach, Sender (Alice) and Receiver (Bob) communicate their cubits via the secure quantum communication link and actual information is communicated with a classical cryptographic approach by means of open communication link [30]. To retrieve the cloud user data, block chain is also an effective technique [31][32][33][34][35]. Automated electrical user's personal clinical database is the present operational patient monitory facility contributing the main portion of preserving and monitoring the user's information, which was the key problem in w.r.t confidential patient's personal files breach [26].…”
mentioning
confidence: 99%
“…Dinh et al [25] show that it is possible to perform computational tasks without requiring prior system knowledge, but instead, with the help of emerging reinforcement learning (RL) algorithms that can optimally learn the dynamic computational triage strategy. Yan et al [26] model the process of offloading and caching to ensure that both edge nodes and edge computing service providers obtain the maximum profit based on game theory and auction theory. Gong et al [27] present an intelligent cooperative edge (ICE) computing in IoTs networks to achieve a complementary integration of AI and edge computing.…”
Section: Related Workmentioning
confidence: 99%