2020 IEEE International Conference on Communications Workshops (ICC Workshops) 2020
DOI: 10.1109/iccworkshops49005.2020.9145381
|View full text |Cite
|
Sign up to set email alerts
|

Secure Distributed Data Management for Fog Computing in Large-Scale IoT Application: A Blockchain-Based Solution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…Chen et al [32] propose the architecture for the creation of a management framework of stable distributed data for fog computing in large-scale Internet of Things applications, coupled with a Blockchain-based data management platform implementation that addresses main issues, how to incorporate information protection and fog-computing storage management into the vast Internet of Things application and improve rational interoperability of connected stuff.…”
Section: Assessment Of Literature Reviewsmentioning
confidence: 99%
See 1 more Smart Citation
“…Chen et al [32] propose the architecture for the creation of a management framework of stable distributed data for fog computing in large-scale Internet of Things applications, coupled with a Blockchain-based data management platform implementation that addresses main issues, how to incorporate information protection and fog-computing storage management into the vast Internet of Things application and improve rational interoperability of connected stuff.…”
Section: Assessment Of Literature Reviewsmentioning
confidence: 99%
“…Current cloud-IoT designs are centralized; therefore, people are not regulated and managed by trusted third parties. According to [32], several fog nodes on a network edge suffer external attacks that lead to severe safety concerns stemming from the confidence relation vulnerability as the attributes of the fog computing system are not considered. In summary, IoT and fog computing have facilitates data acquisition and processing [33], [34] and blockchain intends to solve the challenges of communication security of this domain [35].…”
Section: Blockchain Application In Fog Computingmentioning
confidence: 99%
“…For these changes, studies on the storage and management of information from the ecosphere of multiple services offered by the Cloud (storage, processing, memory and bandwidth) have been proposed as an instance [ 10 ]. Despite this, the cloud shows communication delays and saturated networks due to a lack of bandwidth, which is due to the information overload caused by the scaling of Internet of Things devices (IoT) [ 11 ]. Negative events that have public and private sector groups (business and academia) in the slogan of facing several challenges in the development of architectures and algorithms to achieve intelligent manufacturing, without neglecting the potential offered by the layers of cloud services in their various resources but on a centralized and homogeneous environment, of which [ 12 , 13 ], mention the importance of Cloud service provisioning towards industry proximity, to guarantee resource management and orchestration of component applications and software engines, within decentralized and heterogeneous environments, it is here where Fog FC and EC systems [ 14 , 15 ], aim to solve the challenges involved in Industrial IoT (IIoT) in aspects such as latency, network traffic, energy efficiency, communications and artificial intelligence.…”
Section: Introductionmentioning
confidence: 99%
“…In all these techniques, the data acquired from the edge layer are processed and transmitted to the cloud computing database through the fog layer of IoT architecture using internet network services. Both the internet and cloud computing database are exposed to security threats on the data sensed from the sensor (edge layer) or stored in the cloud layer [8,9]. The conventional data storage and security mechanisms are also not suitable for such a massive amount of generated data.…”
Section: Introductionmentioning
confidence: 99%