4.8 Article

FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Blockchain-Cloud Transparent Data Marketing: Consortium Management and Fairness

Dongxiao Liu et al.

Summary: This paper proposes a Blockchain-Cloud Transparent Data Marketing (Block-DM) approach to address the transparency and fairness issues in IoT data trading. Through a hybrid data-marketing architecture and a consortium committee, secure data trading and identity privacy protection for data owners are achieved.

IEEE TRANSACTIONS ON COMPUTERS (2022)

Article Automation & Control Systems

TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT

Qi Li et al.

Summary: This article proposes an efficient, traceable, and revocable access control scheme named TRAC for mobile healthcare in 5G-enabled IIoT. It utilizes ciphertext-policy attribute-based encryption to protect the confidentiality of personal health records and can precisely track and revoke the privileges of malicious users.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

A Blockchain-Based Machine Learning Framework for Edge Services in IIoT

Youliang Tian et al.

Summary: This article proposes a blockchain-based machine learning framework for edge services in the Industrial Internet of Things (IIoT) to address the challenges of privacy leakage and insufficient model accuracy. By constructing smart contracts, multiparty participation in edge services is encouraged to improve data processing efficiency. Additionally, an aggregation strategy is proposed to verify and aggregate model parameters, ensuring the accuracy of decision tree models. Theoretical analysis and simulation experiments demonstrate that the BML-ES framework is secure, effective, and efficient, better suited for improving the accuracy of edge services in IIoT.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Fair Outsourcing Polynomial Computation Based on the Blockchain

Yunguo Guan et al.

Summary: Outsourcing computation has gained attention due to the explosion of big data from the Internet of Things and the rapid development of cloud computing. Existing schemes for outsourcing polynomial computation are either impractical due to time-consuming cryptographic operations or limitations in terms of allowing arbitrary polynomials or requiring two non-collusive workers. To address these challenges, this article proposes a new scheme that utilizes a variant of Horner's method and blockchain technology. The proposed scheme minimizes computational costs on the worker side and ensures fairness between the user and the worker through public verifiability of the worker's results.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Engineering, Multidisciplinary

Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression

Hanlin Zhang et al.

Summary: This paper discusses the data analysis for CPSS with Linear Regression and introduces a secure, verifiable, and fair approach to outsource LR to an untrustworthy cloud-server, implemented on the Ethereum blockchain.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing

Yinghui Zhang et al.

Summary: Cloud computing is a milestone in the development of outsourcing services, but trust issues between users and providers may impede its wide adoption. BPay, a blockchain-based outsourcing service fair payment framework, ensures secure and fair payment without relying on any third party.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Review Computer Science, Hardware & Architecture

Blockchain-based solutions for cloud computing: A survey

Mallikarjun Reddy Dorsala et al.

Summary: The paper surveys literature on Blockchain-based cloud services and explores how Blockchain technology enhances reliability and transparency in cloud computing. The literature is classified into three categories, investigating various areas including Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service. The authors believe this survey will aid in reengineering cloud data centers in the future.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Information Systems

Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0

Yulei Wu et al.

Summary: Critical infrastructure systems in Industry 4.0 are facing challenges in security and scalability. The convergence of blockchain and edge computing is expected to address these issues and provide secure and scalable critical infrastructures. Current research is mainly focused on security, privacy, and scalability in this area.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Blockchain-Based Edge Computing Resource Allocation in IoT: A Deep Reinforcement Learning Approach

Ying He et al.

Summary: This article discusses the challenges posed by the exponential growth of IoT devices to the computing paradigm, proposing an edge-centric computing framework to address the demands. Blockchain can address the issue of trust absence, while also identifying security and privacy as the main challenges of edge computing.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices

Hanlin Zhang et al.

Summary: Bilinear pairing is a fundamental operation in cryptographic algorithms, but the existing secure outsourcing algorithms for bilinear pairing may not be suitable for resource-constrained IoT devices due to storage burden. The proposed algorithm in this article does not require precomputations, significantly improves efficiency, ensures privacy, and utilizes the Ethereum blockchain for fair payments. Theoretical analysis and experimental results demonstrate the efficiency and security of the proposed algorithm.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme

Zerui Chen et al.

Summary: This study focuses on the verifiable problem of delegation computing in cloud and proposes a novel incentive-compatible rational delegation computing scheme to reduce overhead while maintaining reliability. By considering rational delegation computing as a dynamic game with imperfect information, reasonable and effective incentive mechanisms are designed to achieve lower delegation overhead. The scheme aims to achieve the lowest delegation overhead compared to existing solutions.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Secure and verifiable outsourced data dimension reduction on dynamic data

Zhenzhu Chen et al.

Summary: The dimensionality reduction aims at reducing redundant information in big data for efficient data analysis. Enterprises or individuals with limited resources often outsource this task to the cloud. However, privacy and security concerns arise due to inadequate supervision. A proposed scheme based on incremental NMF method addresses these concerns while ensuring data confidentiality and verifiability of computation results. Experiment evaluation shows the scheme's high efficiency in saving over 80% computation time for clients.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing

Xuejiao Liu et al.

Summary: Fog-aided computing is a new computing paradigm aimed at providing various computation services to end users. Researchers propose a secure and efficient outsourcing computing scheme in vehicular fog computing (SE-VFC) which combines lightweight BLS signature and group signature for batch anonymous authentication of fog vehicles while protecting their privacy. Security analysis confirms the effectiveness of the scheme.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Telecommunications

UTM: A trajectory privacy evaluating model for online health monitoring

Zhigang Yang et al.

Summary: A large amount of sensitive personal data is collected by online health monitoring applications, with user trajectories potentially becoming the key to re-identify users. The User Trajectory Model (UTM) is proposed to mathematically derive statistical characteristics of trajectory uniqueness, validating its effectiveness in privacy risk evaluation.

DIGITAL COMMUNICATIONS AND NETWORKS (2021)

Article Computer Science, Theory & Methods

OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing

Chao Lin et al.

Summary: This research explores the challenge and solution of fair payment in outsourcing computations, proposing an optimized blockchain-based fair payment system model and constructing a blockchain-based solution that does not require zero-knowledge proofs. The utility of the system is demonstrated through security analysis, performance evaluation, and comparison with existing solutions.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Hardware & Architecture

Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach

Chaosheng Feng et al.

Summary: This study proposes a secure data sharing model for flying drones in 5G environment, utilizing blockchain and ABE technology for authentication and data security. The model incorporates smart contracts, public key cryptography, and distributed ledger for authentication and security audit. Furthermore, the ABEM-POC model and parallel computation method significantly improve the speed of outsourced encryption and decryption.

IEEE NETWORK (2021)

Article Computer Science, Information Systems

A Survey on Mobile Augmented Reality With 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects

Yushan Siriwardhana et al.

Summary: Augmented Reality (AR) technology enhances human perception by merging real and virtual worlds. With the rise of 5G and Multi-access Edge Computing (MEC), future Mobile AR applications are poised to achieve ultra-low latency and high data rates.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Theory & Methods

Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT

Kuan Fan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Blockchain-based system for secure outsourcing of bilinear pairings

Chao Lin et al.

INFORMATION SCIENCES (2020)

Article Automation & Control Systems

Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System

Shaoyong Guo et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT

Jinbo Xiong et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Review Computer Science, Information Systems

Toward Edge Intelligence: Multiaccess Edge Computing for 5G and Internet of Things

Yaqiong Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Outsourced privacy -preserving decision tree classification service over encrypted data

Chen Wang et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance

Hongjun Li et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing

Tianyi Zhang et al.

2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)

Article Computer Science, Theory & Methods

Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain

Hui Cui et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Engineering, Multidisciplinary

Channel State Information Prediction for 5G Wireless Communications: A Deep Learning Approach

Changqing Luo et al.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2020)

Article Automation & Control Systems

An Adaptive Dropout Deep Computation Model for Industrial IoT Big Data Learning With Crowdsourcing to Cloud Computing

Qingchen Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Interdisciplinary Applications

The industrial internet of things (IIoT): An analysis framework

Hugh Boyes et al.

COMPUTERS IN INDUSTRY (2018)

Article Computer Science, Theory & Methods

Bitcoin-based fair payments for outsourcing computations of fog devices

Hui Huang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

Yinghui Zhang et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability

Shenmin Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Proceedings Paper Engineering, Electrical & Electronic

Adaptive Weighted Averaged Template Matching Prediction for Intra Coding

Yi Zhang et al.

2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS) (2018)

Article Computer Science, Theory & Methods

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing

Kai Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)