4.8 Article

Data Trusted Sharing Delivery: A Blockchain-Assisted Software-Defined Content Delivery Network

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 10, Issue 14, Pages 11949-11959

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3124091

Keywords

Index Terms-Blockchain; routing sandbox; sixth-generation (6G); software-defined network (SDN)

Ask authors/readers for more resources

The 6G wireless network aims to connect trillions of devices in the future by establishing a new spectrum, high technical standards, and 100% geographic coverage. However, ensuring privacy and security becomes challenging as connectivity and novel applications increase. Blockchain is seen as a promising technology to improve efficiency, reduce costs, and establish a trusted data-sharing environment. This article presents a trusted framework based on blockchain technology for building a trusted software-defined content delivery network, enhancing security and trust relationships between entities in different domains.
The 6G wireless network aims to forge a new spectrum, high technical standards of high time and phase synchronization accuracy, and 100% geographic coverage to connect trillions of devices flexibly and efficiently in the future. However, as connectivity increases and applications become novel, it is a challenge to ensure the privacy and security of networks and applications. Blockchain is seen as a promising technology that can improve efficiency, reduce costs, mitigate security, and privacy threats, and establish a trusted data-sharing environment. This article presents a trusted framework based on blockchain technology from the perspective of how to build a trusted software-defined content delivery network. As the peer node of the blockchain, the software-defined network (SDN) controller establishes trust between different regions and a wide range of participants, realizing peer autonomy and flexible business orchestration. The two main purposes of the architecture are to enhance the security of network communications and establish trust relationships between entities in different domains. It includes trusted communication based on routing sandbox, service choreography based on blockchain, proxy server selection strategy based on model predictive control (MPC), and optimization consensus based on practical Byzantine fault tolerance. Some simulation experiments verify the effectiveness of the theoretical method.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available