BEAF: A Blockchain and Edge Assistant Framework with Data Sharing - - PowerPoint PPT Presentation

beaf a blockchain and edge assistant framework with data
SMART_READER_LITE
LIVE PREVIEW

BEAF: A Blockchain and Edge Assistant Framework with Data Sharing - - PowerPoint PPT Presentation

NJUST BEAF: A Blockchain and Edge Assistant Framework with Data Sharing for IoT Networks Report : Yingxun Hu Email : hyx@njust.edu.cn Nanjing university of science and technology 01 / Introduction


slide-1
SLIDE 1

BEAF: A Blockchain and Edge Assistant Framework with Data Sharing for IoT Networks

答辩人:小熊猫 指导老师:大熊猫

NJUST

Report : Yingxun Hu Email : hyx@njust.edu.cn

Nanjing university of science and technology

slide-2
SLIDE 2

01 / Introduction 02 / System Model 03 / The Framework BEAF 04 / Security Analysis 05 / Performance Discussion 06 / Conclusions

CONTENTS

slide-3
SLIDE 3

Introduction

1

PART ONE

slide-4
SLIDE 4

Background

An Information Carrier

the fifth generation (5G) artificial intelligence technology

IoT market has fully exploded

slide-5
SLIDE 5

decentralized authentication privacy threats and data sharing malicious tracking

Introduction

……

slide-6
SLIDE 6

Introduction

resource allocation social cost saving information resource utilization rate reasonably user privacy disclosure data integrity problem unauthorized data access

……

slide-7
SLIDE 7

Introduction

Blockchain Edge Computing

+

data security privacy protection

slide-8
SLIDE 8

Introduction

……

Block 1

Pre_Hash Timestamp Nonce Hash

……

Block 2

Pre_Hash Timestamp Nonce Hash

……

Block 3

Pre_Hash Timestamp Nonce Hash ……

Consortium blockchains

slide-9
SLIDE 9

Edge computing

Data generating Data processing Data analysis

Introduction

slide-10
SLIDE 10

Literature review

a secure solution for intelligent vehicle data sharing the user-controlled privacy- preserving user profile data sharing based on blockchain a medical data sharing model via blockchain a secured proxy-based data sharing module in IoT environments using blockchain a new mechanism SeShare for data storing based on blockchain 2 1 4 3 5 scheme a cross-domain based data sharing scheme in cooperative edge computing a distributed algorithm developed for VNET the use of traditional public key infrastructure (PKI) a new class of privacy indicators -- Data Controller Indicators (DCIs) a public key re-encryption scheme

……

slide-11
SLIDE 11

System Model

2

PART TWO

slide-12
SLIDE 12

System model

traditional centralized cloud architectures

  • security
  • scalability

BEAF

Edge computing Blockchain

  • computing resources
  • data processing

the resource allocation

  • f edge networks

users

slide-13
SLIDE 13

System model

Figure 1

slide-14
SLIDE 14

System model

U

EN

BC BS

User

  • distribution computation

→ data upload, data encryption and data downloaded

Edge Node Background Server Blockchain

  • upload data
  • query & download data
  • Syst. Management
  • Trace malicious user
  • Data storage
  • Tracing
slide-15
SLIDE 15

Requirements

1 2 3 4 5 6

performance confidentiality system scalability availability data integrity system efficiency system reliability

7

stability and ease of use

slide-16
SLIDE 16

The Proposed Framework BEAF

3

PART THTEE

slide-17
SLIDE 17

Framework

Figure 2

slide-18
SLIDE 18

Framework

A B C D

U → BS : IdU, reg, U_Info BS → BC : IdU, reg, U_Info BC → BS : secret BS → U : secret, indel.html

Register :

slide-19
SLIDE 19

Framework

A B C D

U → BS : IdU, secret, logU BS → BC : IdU, secret, logU BC → BS : true BS → U : indel.html

Login :

slide-20
SLIDE 20

Framework

2 5 3 6 1 4

U → BS : IdU, fileU, U_per, perOrg and req_up U → EN : fileU EN → BC : fileU BS → BC : IdU, U_per, perOrg BC → BS : suc BS → U : suc

Upload :

slide-21
SLIDE 21

Framework

Query :

ONE

U → EN : IdU, req_Info

TWO

EN → BC : IdU, req_Info

THREE

BC → EN : Info

FOUR

EN → U : Info

FIVE

U → EN : fileN

SIX

EN → BC : fileN

SEVEN

BC → EN : fileU

EIGHT

EN → U : fileU

Download :

slide-22
SLIDE 22

Security Analysis

4

PART FOUR

slide-23
SLIDE 23

Security analysis

confidentiality

  • Registered users
  • Encryption

availability

  • Monitor
  • Consensus mechanism

reliability, stability, and scalability

  • illegal / incomplete
  • single point of failure

data integrity

  • Authentication
  • Encryption
  • Immutability

traceability

  • source & ownership
  • ther disputes
  • liability determinations
slide-24
SLIDE 24

Performance Discussion

5

PART FIVE

slide-25
SLIDE 25

1 2 3 4 8 7 6 5

Environment

Webstorm2020.1.1.x64 express-session:1.17.1 docker 21.03 Fabric-node-sdk1.4 Nodejs v8.17.0 Golang 1.10.3 Npm 6.13.4 Ubuntu 18.04

Performance discussion

slide-26
SLIDE 26

Performance discussion

Performance Specific Indicators Value Average Response Time Query (Single file) 372ms Query (All file) 362ms Upload 572ms Download 291ms Reliability System stable (operation duration) 7*24h System failure rate 5 times/week

TABLE II. The performance of the proposed BEAF

slide-27
SLIDE 27

Conclusions

6

PART SIX

slide-28
SLIDE 28

Conclusions

  • Objectives: secure data sharing and privacy preservation
  • Security: data security, data authenticity, privacy protection,

data tamper resistance, and traceability

  • Performance: data query efficiency and system reliability.
  • BEAF: employ blockchain and edge computing paradigms
slide-29
SLIDE 29

THANKS!