Title
ECBCM: A prestige‐based edge computing blockchain security consensus model
Abstract
AbstractAbstractThe explosive growth of data in the network has brought huge burdens and challenges to traditional centralized cloud computing data processing. To solve this problem, edge computing technology came into being. Because the edge is closer to the user, processing part of the data at the edge can also bring a faster response to the user and improve their experience. However, the existing edge computing platforms have problems such as data storage security and multiparty data mutual trust. Blockchain technology has become an important means to solve the above data storage and sharing problems due to its excellent characteristics. The core of blockchain technology is consensus, and its speed and security will directly affect the efficiency and stability of the blockchain system. Therefore, this study uses the consensus mechanism as an entry point to reduce the resource consumption of the edge computing blockchain system and improve its security. In order to reduce the resource consumption of traditional consensus algorithms, improve their adaptability in the edge computing environment, and solve the security problem caused by the concentration of node rights, a prestige‐based edge computing blockchain security consensus model (ECBCM) is proposed. ECBCM is a general model based on prestige rewards and penalties. It also introduces a node replacement mechanism to ensure the fault tolerance of the consensus process. According to the results of multiple sets of performance comparison experiments and security verification experiments after embedding the existing consensus algorithm, the validity of the consensus model is confirmed.This paper introduces a prestige‐based edge computing blockchain security consensus model (ECBCM). ECBCM is proposed to reduce the resource consumption of traditional consensus algorithms, improve their adaptability in the edge computing environment, and prevent security problems caused by node concentration due to power concentration. The ECBCM uses a delegated proof‐of‐stake (DPoS) algorithm to reduce resource consumption, introduces a prestige evaluation mechanism to disperse node rights and curb continuous evil acts, and introduces a node replacement mechanism to reduce the effect of malicious nodes. View Figure
Year
DOI
Venue
2021
10.1002/ett.4015
Periodicals
DocType
Volume
Issue
Journal
32
6
ISSN
Citations 
PageRank 
2161-3915
1
0.34
References 
Authors
0
8
Name
Order
Citations
PageRank
Shichang Xuan174.14
Zhiyu Chen210.34
Ilyong Chung321624.74
Haowen Tan41408.01
Dapeng Man52910.54
X. Du62320241.73
Yang Wu76922.62
Mohsen Guizani86456557.44