Loading…

Resource allocation and trust computing for blockchain-enabled edge computing system

•We design a group-agent strategy with trust computing.•We propose a stacked task sorting and ranking mechanism.•We adopt a secure and efficient content model.•Simulation results show that our scheme has better computational efficiency and higher reliability. In order to meet various needs of people...

Full description

Saved in:
Bibliographic Details
Published in:Computers & security 2021-06, Vol.105, p.102249, Article 102249
Main Authors: Zhang, Lejun, Zou, Yanfei, Wang, Weizheng, Jin, Zilong, Su, Yansen, Chen, Huiling
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:•We design a group-agent strategy with trust computing.•We propose a stacked task sorting and ranking mechanism.•We adopt a secure and efficient content model.•Simulation results show that our scheme has better computational efficiency and higher reliability. In order to meet various needs of people, different Internet of Things (IoT) devices have been developed and applied successfully in recent years. However, the consequent challenges in terms of search efficiency, reliable requirements, and resource allocation appear followed, which attract attention from both academia and industry. Facing this circumstance, it is necessary to establish a new scheme to realize data processing and sharing better. Therefore, a reliable and efficient system based on edge computing and blockchain is proposed in this paper. First, a new group-agent strategy with trust computing is designed to ensure the reliability of edge devices during interactions and improve transmission efficiency. Second, we introduce a stacked task sorting and ranking mechanism which improves resource allocation in each edge device. Third, this paper creates a new content model that uses Zipf distribution to predict context popularity of keywords and encrypt hot data with symmetric searchable encryption (SSE) technology. Finally, simulation results show that the proposed scheme has better computational efficiency and higher reliability compared with existing methods.
ISSN:0167-4048
1872-6208
DOI:10.1016/j.cose.2021.102249