2020
DOI: 10.1109/access.2020.2968621
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment

Abstract: With the public key being the parameter users are mostly addressed by on blockchain network, an intruder can connect transactional patterns to the public key and make a probable revelation of the identity of the user. Due to the diversity in approaches in achieving privacy, integrating the principle of transparency in any blockchain-edge computing platform will present some structural security challenges. Thus, an attempt should be made to achieve confidentiality whilst not eliminating a key principle of block… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 23 publications
0
18
0
Order By: Relevance
“…Many researchers [13] have used blockchain as a scalable and secure data exchange, especially with 5G and edge computing. Combining blockchain with edge computing offers low latency and context-aware processing, which is suitable for medical applications [13,19,20,21].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Many researchers [13] have used blockchain as a scalable and secure data exchange, especially with 5G and edge computing. Combining blockchain with edge computing offers low latency and context-aware processing, which is suitable for medical applications [13,19,20,21].…”
Section: Introductionmentioning
confidence: 99%
“…Edge computing is the utilization of computational and network resources in mobile and edge devices for offloading processing from centralized or cloud servers on a larger scale [19,20,21,22]. Edge devices are more context-aware, which improves the accuracy of data collection on edge devices.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, blockchain provides a high level of management for IoT systems by using privileged digital identities and access management [11]. Many researchers illustrate the importance of connecting the IoT systems to a blockchain-based technology to increase the security level and the IoT performance [12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the emergence of Bitcoin [21] in 2009, Ethereum [22] in 2013, and Hyperledger Fabric [23] in 2016, blockchain technologies [21,22], providing a trusted mechanism without a CA and TTP, have received significant attention and interest in academia and the IT industry. e fundamental technology of blockchains, such as Bitcoin and Ethereum, has gained increasingly more attention and has begun to be applied to various fields, such as medical data access [24][25][26], the Internet of ings [27,28], and privacy preservation [29][30][31]. However, the high cost of certificate-based public key authentication is still problematic.…”
Section: Introductionmentioning
confidence: 99%