Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

TrustChain: A Privacy Preserving Blockchain with Edge Computing

Jayasinghe, U, Lee, GM, MacDermott, Á and Rhee, WS (2019) TrustChain: A Privacy Preserving Blockchain with Edge Computing. Wireless Communications and Mobile Computing. ISSN 1530-8669

[img]
Preview
Text
TrustChain A Privacy Preserving Blockchain with Edge Computing.pdf - Published Version
Available under License Creative Commons Attribution.

Download (3MB) | Preview

Abstract

Recent advancements in the Internet of Things (IoT) has enabled the collection, processing, and analysis of various forms of data including the personal data from billions of objects to generate valuable knowledge, making more innovative services for its stakeholders. Yet, this paradigm continuously suffers from numerous security and privacy concerns mainly due to its massive scale, distributed nature, and scarcity of resources towards the edge of IoT networks. Interestingly, blockchain based techniques offer strong countermeasures to protect data from tampering while supporting the distributed nature of the IoT. However, the enormous amount of energy consumption required to verify each block of data make it difficult to use with resource-constrained IoT devices, and with real-time IoT applications. Nevertheless, it can expose the privacy of the stakeholders due to its public ledger system even though it secures data from alterations. Edge computing approaches suggest a potential alternative to centralized processing in order to populate real-time applications at the edge and to reduce privacy concerns associated with cloud computing. Hence, this paper suggests the novel privacy preserving blockchain called TrustChain which combines the power of blockchains with trust concepts to eliminate issues associated with traditional blockchain architectures. This work investigates how TrustChain can be deployed in the edge computing environment with different levels of absorptions to eliminate delays and privacy concerns associated with centralized processing, and to preserve the resources in IoT networks.

Item Type: Article
Uncontrolled Keywords: 0805 Distributed Computing, 0906 Electrical and Electronic Engineering
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: Hindawi
Date Deposited: 20 Jun 2019 09:03
Last Modified: 04 Sep 2021 09:16
DOI or ID number: 10.1155/2019/2014697
URI: https://researchonline.ljmu.ac.uk/id/eprint/10912
View Item View Item