beaf a blockchain and edge assistant framework with data
play

BEAF: A Blockchain and Edge Assistant Framework with Data Sharing - PowerPoint PPT Presentation

NJUST BEAF: A Blockchain and Edge Assistant Framework with Data Sharing for IoT Networks Report : Yingxun Hu Email : hyx@njust.edu.cn Nanjing university of science and technology 01 / Introduction


  1. NJUST BEAF: A Blockchain and Edge Assistant Framework with Data Sharing for IoT Networks Report : Yingxun Hu 答辩人:小熊猫 指导老师:大熊猫 Email : hyx@njust.edu.cn Nanjing university of science and technology

  2. 01 / Introduction 02 / System Model 03 / The Framework BEAF CONTENTS 04 / Security Analysis 05 / Performance Discussion 06 / Conclusions

  3. 1 PART ONE Introduction

  4. Background An Information Carrier artificial intelligence the fifth generation (5G) technology IoT market has fully exploded

  5. Introduction decentralized authentication privacy threats and data sharing malicious tracking ……

  6. Introduction resource allocation social cost saving information resource utilization rate reasonably user privacy disclosure data integrity problem unauthorized data access ……

  7. Introduction + Edge Computing Blockchain data security privacy protection

  8. Introduction Block 1 Block 2 Block 3 Pre_Hash Pre_Hash Pre_Hash Timestamp Timestamp Timestamp …… Nonce Nonce Nonce Hash Hash Hash …… …… …… Consortium blockchains

  9. Introduction Edge computing Data generating Data processing Data analysis

  10. Literature review 2 4 the user-controlled privacy- a secure solution for preserving user profile data a medical data sharing intelligent vehicle data sharing based on blockchain model via blockchain sharing a secured proxy-based a new mechanism SeShare data sharing module in for data storing based on IoT environments using blockchain 5 1 blockchain 3 the use of traditional public key a cross-domain based data infrastructure (PKI) sharing scheme in cooperative edge computing a new class of privacy indicators -- scheme Data Controller Indicators (DCIs) a distributed algorithm developed for VNET a public key re-encryption scheme ……

  11. 2 PART TWO System Model

  12. System model BEAF traditional centralized Edge computing Blockchain cloud architectures • • security computing resources the resource allocation • • scalability data processing of edge networks users

  13. System model Figure 1

  14. System model User Background Server U BS • • Syst. Management upload data • • Trace malicious user query & download data BC EN Edge Node Blockchain • • Data storage distribution computation • → data upload, data encryption Tracing and data downloaded

  15. Requirements confidentiality data integrity 1 2 performance availability system reliability 3 4 system scalability system efficiency 5 6 7 stability and ease of use

  16. 3 PART THTEE The Proposed Framework BEAF

  17. Framework Figure 2

  18. Framework Register : U → BS : Id U , reg, U_Info A B BS → BC : Id U , reg, U_Info C BC → BS : secret D BS → U : secret, indel.html

  19. Framework Login : U → BS : Id U , secret, log U A B BS → BC : Id U , secret, log U C BC → BS : true D BS → U : indel.html

  20. Framework Upload : U → BS : Id U , file U , U_per, BS → BC : Id U , U_per, perOrg 1 4 perOrg and req_up U → EN : file U BC → BS : suc 2 5 EN → BC : file U 3 6 BS → U : suc

  21. Framework Download : Query : ONE FIVE U → EN : Id U , req_Info U → EN : fileN TWO SIX EN → BC : Id U , req_Info EN → BC : fileN THREE SEVEN BC → EN : Info BC → EN : file U FOUR EIGHT EN → U : Info EN → U : file U

  22. 4 PART FOUR Security Analysis

  23. Security analysis reliability, stability, availability confidentiality and scalability • • Registered users Monitor • illegal / incomplete • • Encryption Consensus mechanism • single point of failure traceability data integrity • source & ownership • Authentication • other disputes • Encryption • liability determinations • Immutability

  24. 5 PART FIVE Performance Discussion

  25. Performance discussion Webstorm2020.1.1.x64 Nodejs v8.17.0 1 5 Golang 1.10.3 2 6 express-session:1.17.1 Environment docker 21.03 3 7 Npm 6.13.4 4 8 Fabric-node-sdk1.4 Ubuntu 18.04

  26. Performance discussion Performance Specific Indicators Value Query (Single file) 372ms Query (All file) 362ms Average Response Time Upload 572ms Download 291ms System stable 7*24h Reliability (operation duration) System failure rate 5 times/week TABLE II. The performance of the proposed BEAF

  27. 6 PART SIX Conclusions

  28. Conclusions • Objectives: secure data sharing and privacy preservation • Security: data security, data authenticity, privacy protection, data tamper resistance, and traceability • Performance: data query efficiency and system reliability. • BEAF: employ blockchain and edge computing paradigms

  29. THANKS!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend