5592 RRGG

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“ Jnana Sangama” , Belagavi-590018, Karnataka

Technical Seminar Synopsis on

“ Blockchain-Enabled Fog Resource Access and


Granting”

Submitted by

USN Name

1BI19CS038 Bharath Gowda B

Under the Guidance of

Prof. Tejashwini P S

Assistant Professor
Department of CSE, BIT
Bengaluru-560004

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


BANGALORE INSTITUTE OF TECHNOLOGY
K.R. Road, V.V.Pura, Bengaluru-560 004
2022-23
1. INTRODUCTION

Fog computing is an extension of traditional cloud-based computing model, which

selectively moves computing, storage, communication, control, and decision making

closer to the network edge where data are being generated. Similar with edge

computing concept, fog computing can relieve the limitations in current network

infrastructure and better support mission-critical, data-dense use cases.

Fog computing is often erroneously called edge computing, but there are key

differences. As its name suggests, fog is geographically distributed with uncertainty

and instability, similar to the real fog that floats everywhere without a fixed shape. As

for the edge concept, it always means relatively static or stable resources, which are

typically deployed at certain places, e.g., a central office.

In a word, federating and floating are the key differences between the fog and edge

nodes rather than physical location. In fog cases, the geo-distributed fog resources are

federated as a ubiquitous resource pool. In addition, different fog nodes may work

together to support collaborative tasks, e.g., Augmented Reality (AR) mobility, robot

teamwork, and distributed storage. Services or applications can be unaware of any

specific fog node that provides resources and where it is. To some extent, edge

computing can also be considered as a type of fog computing.

Blockchain is a technology to record transactional ledgers in an immutable way which

means data cannot be changed once recorded. Each block consists of body which

stores data, and header which stores previous and current hash values and nonce. If

the data of the body changes, it changes the hash value of the block and thus the next

block is removed from the chain by creating sub-chains. After that, the consensus

protocol verifies which sub-chain is original and removes other malicious sub-chains.

This ensures that every block of the main chain has not been tampered with. The
security and immutability of Blockchain can only be threatened if 51% of the miners

become dishonest and tamper with the data which is practically near impossible.
2. LITERATURE REVIEW

T. M. Fernandez-Carames and P. Fraga-Lamas [1] gave a thorough review on how

to adapt blockchain to the specific needs of the IoT to develop Blockchain-based

IoT (BIoT) applications. After describing the basics of blockchain, the most

relevant BIoT applications were described to emphasize how blockchain can affect

traditional cloud-centred IoT applications. Current challenges and possible

optimizations are also detailed regarding many aspects that affect the design,

development, and deployment of BIoT applications.

In order to implement access permission propagation, Yu Chen et al. [2] proposed

the BlendCAC methodology. A robust, identity-based capability token management

strategy was used to exploit a smart contract for registration, propagation, and

revocation of the access authorization. In the proposed BlendCAC scheme, IoT

devices are their own master to control their resources instead of being supervised

by a centralized authority.

Aiming to provide finer access control, Y. L. Chen et al. [3] proposed a

location-aware authentication scheme using smart contracts to ensure that IoT

devices can securely perform Wi-Fi network authentication. The scheme adopts

the concept of secondary authentication and consists of two phases: the

registration phase, which is mainly designed to complete the generation of the

public and private keys and to link the device information with its related device

information and the authentication phase, which is mainly designed to determine

whether the requesting device is within a legal location range. The smart contract

is used to ensure the credibility and irreparability of the authentication process.


Singh et al. [3] proposed BFAN (Blockchain and Fog-based Architecture Network)

in which “ Dew Computing” concepts are applied to provide fast and scalable

services to the IoE devices. But, in their architecture, they did not clearly state how

they used Blockchain into their concept.

Jang et al. [4] proposed an architecture designed for industrial environment. They

used Hyperledger Fabric in their scheme for analysing security. This scheme was

proposed for environments where real-time data processing was not required.

Clearly, this does not align with the idea of Fog computing which is mainly used to

achieve low-latency by processing in real-time.

Muthanna et al. [5] proposed a scheme where SDN controller was used alongside

Blockchain. A data offloading algorithm and traffic model was also introduced in

their architecture. Blockchain minimized the attack threats but their proposal of

using Blockchain with SDN was not elaborately explained.

Zhu et al. [6] presented an architecture where the main target was to focus on the

problem of identity management. They proposed Blockchain-based distributed

public ledger to record identities in a trustless environment. However, recording

data directly into Blockchain can consume massive amount of energy.

Pan et al. [7] proposed EdgeChain system with integrated permissioned Blockchain

and smart contract. They also proposed an internal currency system for managing

resources. But the security aspects of the architecture were not discussed in their

scheme and comparison with real world architecture was not performed.

Fitwi et al. [9] proposed a lightweight framework for privacy protection called LibPri

for smart surveillance. Their object detection model used permissioned Blockchain
but was not clearly presented. And there was not enough information about the

consensus used in their Blockchain network

3. LIMITATIONS OF EXISTING SYSTEM

Fog computing is a new computing paradigm for meeting ubiquitous massive access

and latency-critical applications by moving the processing capability closer to end

users.

The geographical distribution/floating features with potential autonomy requirements

introduce new challenges to the traditional methodology of network access control.

During the entire fog resource access and granting procedure, several issues emerge.

1. Fog node identity and target node selection: How can a subscriber or application

client be helped at performing authentication with target fog nodes, given that

these fog nodes are geographically distributed? In cloud computing, we usually use

one uniform and centralized authentication entrance for a subscriber to apply a

cloud resource. The cloud subscribers normally do not care about where the cloud

resource is. However, in fog computing, subscribers must choose the proper fog

node to fulfil their requirements (computing, storage, latency, price, etc.). In fog

computing, subscribers need to know which fog node they chose and its location.

This means the subscriber or application client needs to access and submit

requests to the targeted fog, and the fog node should perform an authentication

procedure and then grant corresponding resources. The procedure is quite

different from traditional cloud computing.

2. Dynamic credential for each transaction: In fog computing, one subscriber may

submit resource requests to different fog nodes. This means the subscriber should

submit different credential keys when requesting different fog nodes. While in a
cloud computing scenario, a subscriber usually only maintains one credential for a

cloud resource request. When many potential fog nodes are available, how can a

flexible/reliable authentication methodology be designed for a subscriber to

access a targeted fog node?

3. Dynamic independent offer provision: In fog computing, different fog nodes may

provide different resource offers to requesters. For example, fog node A may offer

its 1 GB storage space and charge 1 dollar per hour, while fog node B may charge

more or less for the same resource offer. How to support independent fog resource

granting is a unique problem in fog computing.

4. Authentication and resource offering: In typical fog scenarios, the resource access

and granting may be performed with per-transaction granularity. When a subscriber

intends to access specific resources from fog node A, he must trigger a new

transaction and obtain a specific credential that is only valid during the duration

indicated by the transaction profile. After the expiration time, the subscriber should

trigger a new transaction process and submit new credentials for resource access.

Each time, the fog node must verify different access credentials, even for

requirements from the same subscriber.


4. PROPOSED SYSTEM

Fog computing plays a crucial role in satisfying the requirements of

delay-sensitive applications, such as VR, AR, and industrial production lines. Fog

nodes are also a type of network resource, but they have unique characteristics:

geo-distributed, autonomous, and independent offerings. Traditional network control

and resource granting methodologies usually assume that the relevant resources are

placed behind a certain authentication point, which may not be suitable for fog

computing cases. Furthermore, in some cases, fog nodes may belong to different

owners or individuals who would sell the resources at a very different price and may

dynamically adjust the resource offer.

Addressing these new requirements, proposed a smart-contract-based fog

resource access and granting mechanism to enable decentralized authentication and

independent resource offering/granting for each fog node.

5. ARCHITECTURE

“ ”
6. APPLICATIONS

Smart grid

Smart grid is the next generation electric power distribution net-

work. Smart grids contain transmission lines, substations, trans-

former and so forth

Smart grid

Smart grid is the next generation electric power distribution net-

work. Smart grids contain transmission lines, substations, trans-

former and so forth

1. Health Care System: Health care services and applications are delay responsive

and create confidential information of the patients. Fog computing play an

important role in emergency medical service with little latency restrictions

associated with implantable medical devices, ambulance communications or

portable access to patient medical files.

2. Augmented reality (AR): Augmented reality is the ability to encircle overlay the

digital and virtual thing into the real world. The augmented reality information

requires low latency and a high information handling rate to give the right

information as indicated by the client location.

3. Video Streaming System: In fog computing video streaming application allows

mobile users to watch the recent video available on screen. The role of fog

computing in the efficient processing and quick decision making is very important.
4. Smart grid: Smart grid is the next generation electric power distribution net-work. It

utilizes bidirectional streams of power and data to create an automated and

distributed strengthen energy distribution network.

5. Health care system

6. Health care services and applications are delay responsive and

7. create confidential information of the patients.

8. Augmented reality(AR)

9. Augmented reality is the ability to encircle overlay the digital

10. and virtual thing into the real world[

11. 49

12. ]. The augmented re-

13. ality information require low latency and a high information

14. handling rate to give the right information as indicated by the

15. Vedio streaming system

16. In fog computing video streaming application allows mobile

17. users to watch the recent video available on screen [

18. 55

19. ]. The

20. role of fog computing in the efficient processing and quick deci-

21. sion making is very important.


7. REFERENCES

[1] T. M. Fernandez-Carames and P. Fraga-Lamas, “

,” IEEE Access, vol. 6, pp. 32979– 33001, 2018.

[2] R. H. Xu, Y. Chen, E. Blasch, and G. S. Chen, “

,” in Proc. 2018 IEEE Int. Conf.

Internet of Things, pp. 1027– 1034. 114 Intelligent and Converged Networks, 2021,

2(2): 108– 114

[3] Y. L. Chen, X. J. Wang, Y. L. Yang, and H. Li, “

Sensors, vol. 20, no. 4, p. 1062, 2020.

[4] P. Singh, A. Nayyar, A. Kaur, and U. Ghosh, “

” Future Internet, vol. 12, no. 4, p. 61, 2020.

[5] S.-H. Jang, J. Guejong, J. Jeong, and B. Sangmin, “

,” in International Conference on Computational

Science. Springer, 2019, pp. 593– 606.


[6] A. Muthanna, A. A Ateya, A. Khakimov, I. Gudkova, A. Abuarqoub, K. Samouylov, and

A. Koucheryavy, “

” Journal of Sensor and Actuator

Networks, vol. 8, no. 1, p. 15, 2019.

[7] X. Zhu and Y. Badr, “

,” in 2018 IEEE International Conference on

Internet of Things (iThings) and IEEE Green Computing and Communications

(GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE

Smart Data (SmartData). IEEE, 2018, pp. 1361– 1366.

[8] J. Pan, J. Wang, A. Hester, I. Alqerm, Y. Liu, and Y. Zhao, “

,” IEEE Internet of

Things Journal, vol. 6, no. 3, pp. 4719– 4732, 2018.

[9] A. Fitwi, Y. Chen, and S. Zhu, “

,” in 2019 IEEE International Conference on Blockchain

(Blockchain). IEEE, 2019, pp. 552– 555.

You might also like