Research article Special Issues

Secure data storage based on blockchain and coding in edge computing

  • Received: 03 December 2018 Accepted: 31 January 2019 Published: 07 March 2019
  • Edge computing is an important tool for smart computing, which brings convenience to data processing as well as security problems. In particular, the security of data storage under edge computing has become an obstacle to its widespread use. To solve the problem, the mechanism combing blockchain with regeneration coding is proposed to improve the security and reliability of stored data under edge computing. Our contribution is as follows. 1) According to the three-tier edge computing architecture and data security storage requirements, we proposed hybrid storage architecture and model specifically adapted to edge computing. 2) Making full use of the data storage advantages of edge network devices and cloud storage servers, we build a global blockchain in the cloud service layer and local blockchain is built on the terminals of the Internet of things. Moreover, the regeneration coding is utilized to further improve the reliability of data storage in blockchains. 3) Our scheme provides a mechanism for periodically validating hash values of data to ensure the integrity of data stored in global blockchain.

    Citation: Yongjun Ren, Yan Leng, Yaping Cheng, Jin Wang. Secure data storage based on blockchain and coding in edge computing[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 1874-1892. doi: 10.3934/mbe.2019091

    Related Papers:

  • Edge computing is an important tool for smart computing, which brings convenience to data processing as well as security problems. In particular, the security of data storage under edge computing has become an obstacle to its widespread use. To solve the problem, the mechanism combing blockchain with regeneration coding is proposed to improve the security and reliability of stored data under edge computing. Our contribution is as follows. 1) According to the three-tier edge computing architecture and data security storage requirements, we proposed hybrid storage architecture and model specifically adapted to edge computing. 2) Making full use of the data storage advantages of edge network devices and cloud storage servers, we build a global blockchain in the cloud service layer and local blockchain is built on the terminals of the Internet of things. Moreover, the regeneration coding is utilized to further improve the reliability of data storage in blockchains. 3) Our scheme provides a mechanism for periodically validating hash values of data to ensure the integrity of data stored in global blockchain.


    加载中


    [1] A. Khan, M. Othman, S. Madani, et al., A survey of mobile cloud computing application models, IEEE Commun. Surv. Tut., 16 (2014), 393–413.
    [2] G. Dan, K. Jeremy, S. Evan, et al., Cloud-Trust-a security assessment model for infrastructure as a service (IaaS) clouds, IEEE T. Cloud Comput., 5 (2017), 523–536.
    [3] J. Wang, Y. Cao, B. Li, et al., Particle swarm optimization based clustering algorithm with mobile sink for WSNs, Future Gener. Comp. Sy., 76 (2017), 452–457.
    [4] S. Li, L. Xu, S. Zhao, et al., Internet of things: A survey, J. Ind. Inf. Integr., 10 (2018), 1–9.
    [5] P. Ray, A survey on Internet of Things architectures, J. King Saud University-Comput. Inf. Sci., 30 (2018), 291–319.
    [6] L. Bittencourt, R. Immich, R. Sakellariou, et al., The Internet of Things, fog and cloud continuum: integration and challenges, Internet. Things, 4 (2018), 134–155.
    [7] R. Olaniyan, O. Fadahunsi and M. Maheswaran, Opportunistic edge computing: concepts, opportunities and research challenges, Future Gener. Comp. Sy., 89 (2018), 633–645.
    [8] P. Hu, D. Sahraoui and H. Ning, Survey on fog computing: architecture, key technologies, applications and open issues, J.Netw. Comput. Appl., 98 (2017), 27–42.
    [9] S. Ola, E. Imad and C. Ali, IoT survey: an SDN and fog computing perspective, Comput. Netw., 143 (2018), 221–246.
    [10] J. Zhang, Y. Zhao, B. Chen, et al., Survey on data security and privacy-preserving for the research of edge computing, J. Comm., 39 (2018), 1–21.
    [11] T. Taleb, K. Samdanis, B. Mada, et al., On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration, IEEE Commun. Surv. Tut., 19 (2017), 1657–1681.
    [12] M. Marjanović, A. Antonić, I. Podnar, et al., Edge computing architecture for mobile crowdsensing, IEEE Access, 6 (2018), 10662–10674.
    [13] D. Zeng, Y. Dai, F. Li, et al., Adversarial learning for distant supervised relation extraction, Comput. Mater. Con., 55 (2018), 121–136.
    [14] Y. Tu, Y. Lin, J. Wang, et al., Semi-supervised learning with generative adversarial networks on digital signal modulation classification, Comput. Mater. Con., 55 (2018), 243–254.
    [15] C. Yin, J. Xi, X, Sun, et al., Location privacy protection based on differential privacy strategy for big data in Industrial Internet of Things, IEEE T. Ind. Inform., 14 (2018), 3628–3636.
    [16] S. N. Shirazi, A. Gouglidis, A. Farshad, et al., The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective, IEEE J. Sel. Area. Comm., 35 (2017), 2586–2595.
    [17] E. B. Tirkolaee, A. A. R. Hosseinabadi, M. Soltani, et al., A hybrid genetic algorithm for multi-trip green capacitated arc routing problem in the scope of urban services, Sustainability, 10 (2018), 1–21.
    [18] W. D. Wang and J. Y. Lang, Reflection and prospect: precise radiation therapy based on bionomics/radionics and artificial intelligence technology, Chinese J. Clin. Oncol., 45 (2018), 30648–30656.
    [19] R. Khanna, H. Liu and T. Rangarajan, Wireless data center management: sensor network applications and challenges, IEEE Microw. Mag., 15 (2014), S45–S60.
    [20] C. Yang, D. Puthal, S. Mohanty, et al., Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks, IEEE Consum. Electr. M., 6 (2017), 48–56.
    [21] J. Wang, C. Ju, H. Kimet, et al., A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs, Cluster Comput., 3 (2017), 1–9.
    [22] R. Meng, S. Rice, J. Wang, et al., A fusion steganographic algorithm based on faster R-CNN, Comput. Mater. Con., 55 (2018), 1–16.
    [23] B. Gong, P. Cheng, Z. Chen, et al., Spatiotemporal compressive network coding for energy-efficient distributed data storage in wireless sensor networks, IEEE Commun. Lett., 19 (2015), 803–806.
    [24] Y. Yang, J. Miao, Y. Zhao, et al., Distributed information storage and retrieval in 3D sensor networks with general topologies, IEEE ACM T. Network., 23 (2015), 1149–1162.
    [25] J. Wang, J. Cao, S. Ji, et al., Energy-efficient cluster based dynamic routes adjustment approach for wireless sensor networks with mobile sinks, J. Supercomput., 73 (2017), 3277–3290.
    [26] L. Xiang, Y. Li, W. Hao, et al., Reversible natural language watermarking using synonym substitution and arithmetic coding, Comput. Mater. Con., 55 (2018), 541–559.
    [27] O. Diallo, R. Joel, M. Sene, et al., Distributed database management techniques for wireless sensor networks, IEEE T. Parall. Distr., 26 (2015), 604–620.
    [28] A. Al-Dhaqm, S. Razak, S. H. Othman, et al., CDBFIP: common database forensic investigation processes for Internet of Things, IEEE Access, 5 (2017), 24401–24416.
    [29] Y. Ren, Y. Liu, S. Ji, et al., Incentive mechanism of data storage based on blockchain for wireless sensor networks, Mob. Inf. Syst., 2018 (2018), 1–10.
    [30] S. Fang, L. Xu and Y. Zhu, An integrated system for regional environmental monitoring and management based on Internet of Things, IEEE T. Ind. Inform., 10 (2014), 1596–1605.
    [31] D. E. Kouicem, A. Bouabdallah and H. Lakhlef, Internet of things security: A top-down survey, Comput. Netw., 141 (2018), 199–221.
    [32] C. Wei, Z. Wang, E. Jason, et al., Decentralized applications: the blockchain-empowered software system, IEEE Access, 6 (2018), 53019–53033.
    [33] F. Tschorsch and B. Scheuermann, Bitcoin and beyond: a technical survey on decentralized digital currencies, IEEE Commun. Surv. Tut., 18 (2016), 2084–2123.
    [34] R. B. Uriarte and R. D. Nicola, Blockchain-based decentralized cloud/fog solutions: challenges, opportunities, and standards, IEEE Commun. Standards Mag., 2 (2018), 22–28.
    [35] K. Govinda, P. Nin, V. Lalitha, et al., Codes with local regeneration and erasure correction, IEEE T. Inform. Theory, 60 (2014), 4637–4660.
    [36] J. Yao, K. Zhang, Y. Yang, et al., Emergency vehicle route oriented signal coordinated control model with two-level programming, Soft Comput., 22 (2018), 4283–4294.
    [37] Y. Hu, L. Patrick, K. W. Shum, et al., Proxy-assisted regenerating codes with uncoded repair for distributed storage systems, IEEE T. Inform. Theory, 64 (2018), 2512–2528.
    [38] Y. Chen, L. Wang, X. Yan, et al., Mimic storage scheme based on regenerated code, J. Commun., 39 (2018), 21–34.
    [39] J. Wang, C. Ju, Y. Gao, et al., A PSO based energy efficient coverage control algorithm for wireless sensor networks, Comput. Mater. Con., 56 (2018), 433–446.
    [40] J. Wang, Z. Zhang and B. Li, An enhanced fall detection system for elderly person monitoring using consumer home networks, IEEE T. Consum. Electr., 60 (2014), 23–29.
    [41] Y. Ren, J. Shen, D. Liu, et al., Evidential quality preserving of electronic record in cloud storage, J. Internet Technol., 17 (2016), 1125–1132.
    [42] X. Li, A fast and exhaustive method for heterogeneity and epistasis analysis based on multi-objective optimization, Bioinformatics, 33 (2017), 2829–2836.
    [43] X. Li, J. Y. Peng, J. W. Niu, et al., A robust and energy efficient authentication protocol for Industrial Internet of Things, IEEE Internet Things J., 5 (2018), 1606–1615.
    [44] J. Wang, J. Y. Cao, R. Simon, et al., An improved ant colony optimization-based approach with mobile sink for wireless sensor networks, J. Supercomput., 74 (2018), 6633–6645.
    [45] J. Wang, Y. Gao, X. Yin, et al., An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks, Wirel. Commun. Mob. Com., 18 (2018), 1–9.
    [46] X. Li, J. W. Niu, M. Bhuiyan, et al., A robust ECC based provable secure authentication protocol with privacy preserving for industrial internet of things, IEEE T. Ind. Inform., 14 (2017), 3599–3609.
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(6467) PDF downloads(1091) Cited by(81)

Article outline

Figures and Tables

Figures(7)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog