9
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing

      research-article

      Read this article at

          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the increased rate of device sales and utilization increases the demand for edge computing technology with collaborative procedures. However, there is a well-established paradigm designed to optimize various distinct quality-of-service requirements, including bandwidth, latency, transmission power, delay, duty cycle, throughput, response, and edge sense, and bring computation and data storage closer to the devices and edges, along with ledger security and privacy during transmission. In this article, we present a systematic review of blockchain Hyperledger enabling fog and edge computing, which integrates as an outsourcing computation over the serverless consortium network environment. The main objective of this article is to classify recently published articles and survey reports on the current status in the domain of edge distributed computing and outsourcing computation, such as fog and edge. In addition, we proposed a blockchain-Hyperledger Sawtooth-enabled serverless edge-based distributed outsourcing computation architecture. This theoretical architecture-based solution delivers robust data security in terms of integrity, transparency, provenance, and privacy-protected preservation in the immutable storage to store the outsourcing computational ledgers. This article also highlights the changes between the proposed taxonomy and the current system based on distinct parameters, such as system security and privacy. Finally, a few open research issues and limitations with promising future directions are listed for future research work.

          Related collections

          Most cited references117

          • Record: found
          • Abstract: not found
          • Article: not found

          Edge Computing: Vision and Challenges

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            The Emergence of Edge Computing

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found
              Is Open Access

              All one needs to know about fog computing and related edge computing paradigms: A complete survey

                Bookmark

                Author and article information

                Contributors
                Journal
                PeerJ Comput Sci
                PeerJ Comput Sci
                peerj-cs
                PeerJ Computer Science
                PeerJ Inc. (San Diego, USA )
                2376-5992
                26 March 2024
                2024
                : 10
                : e1933
                Affiliations
                [1 ]Department of Computer Science, Benazir Bhutto Shaheed University Lyari , Karachi, Sindh, Pakistan
                [2 ]Department of Computer Science, Sindh Madressatul Islam University , Karachi, Sindh, Pakistan
                [3 ]Software Collage, Shenyang Normal University , Shenyang, China
                [4 ]Department of Information Technology, College of Computers and Information Technology, Taif University , Taif, Saudi Arabia
                [5 ]Department of Computer Science, College of Computers and Information Technology, Taif University , Taif, Saudi Arabia
                [6 ]Department of Computer Engineering and Networks, College of Computer and Information Sciences, Jouf University , Sakaka, Saudi Arabia
                [7 ]Center for Computational Imaging and Visual Innovations, De La Salle University , Manila, Philippines
                [8 ]Faculty of Information and Communication Studies, University of the Philippines Open University , Los Baños, Philippines
                [9 ]Department of Information Management and Business Systems, Faculty of Management, Comenius University Bratislava , Bratislava, Slovakia
                Article
                cs-1933
                10.7717/peerj-cs.1933
                11041953
                38660154
                2b5bf98f-27b7-4ebd-836b-6a5e472a1479
                ©2024 Ayub Khan et al.

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                History
                : 20 December 2023
                : 18 February 2024
                Funding
                The authors received no funding for this work.
                Categories
                Computer Networks and Communications
                Cryptography
                Security and Privacy
                Internet of Things
                Blockchain

                edge computing,fog computing,blockchain hyperledger,chain codes (smart contracts),data management,outsourcing computation

                Comments

                Comment on this article