您好,欢迎光临本网站![请登录][注册会员]  
文件名称: Xu et al. - 2019 - Making Big Data Open in Edges A Resource-Efficien.pdf
  所属分类: 比特币
  开发工具:
  文件大小: 1mb
  下载次数: 0
  上传时间: 2019-10-05
  提 供 者: liang******
 详细说明:论文 - Making Big Data Open in Edges: A Resource-Efficient Blockchain-Based Approach872 lEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. VOL 30. NO. 4. APRIL 2019 mobile edge computing collaboration in 5G ecosystem. The and the throughput can achieve up to tens of thousands of authors illustrated a context-aware and dynamic collabora- transactions per second. Milutinovic et al. [27] designed a tion infrastructure in the edge of Radio Access Network time-and energy- efficient blockchain consensus algorithm (RAN consisting of mobile edge devices, edge services and based on extra trusted execution environments. The core base stations, where the heterogeneous resources are merged function of this algorithm is constructed on the random It edges. Zhang et al. [14] developed a novel computing par- number generation of the underpinned trusted execution adigm for big data sharing called Firework in collaborative environment. Turesson et al. [28] proposed to use deep edges, where virtual shared data views are built and data is learning model training rather than calculate hash in Proof transmitted to users through predefined interfaces. This of-Work consensus Luu et al. [29] proposed a secure shard framework guarantees users' privacy as well as solving the ing protocol for blockchain mining, which is also used in response latency issue by pushing data to the network edges. Ethereum for improving the throughput and scalability Wu et al. [15] proposed a two-step detection mechanism in Zheng et al. [30] gave an overview of classic blockchain mobilc cdge collaboration, whcrc uscrs preferences arc con- technologics from the aspects of thc architccture and the cerned for constructing virtual communities and collabora- consensus Based on this work, Bach et al. 131 performed a tive clusters. Moreover, a video coding sharing mechanism further comparative analysis of several classic and modern based on users identities is developed for flexible video dis- blockchain consensus algorithms from complexity, scalabil- tribution and decreasing energy consumption at the edge of ity, security, and rewarding method mobile networks. To adapt blockchain to the edge comput Different from these previous works, we first develop a ing, Xiong et al. [16], [17l proposed to offload the mining task green blockchain framework to enable trust for big data to the edge computing service providers, who make profit sharing in collaborative edges. Then, we put forward green by providing computational resource. In the proposed sce- PoC consensus mechanism in our framework to reduce nario, Stackelberg game is used to optimize the price of the computational resources in edges, where edge devices give resource Stanciu [11] proposcd to usc blockchain as a dis- thcir proof of contributing collaboration to compete for tributed control system confirming to the IEC standard. block generation, rather than wasting computational resour Samaniego et al. [181, [19 leveraged blockchain as the carrier ces to solve mathematic puzzle. Furthermore, we propose a of the virtual resource, which is a kind of micro-services, to futile transaction theory and establish transaction offloading reduce the computation moving cost on edge hosts module based on ftf algorithm for reduction of storage resources occupied by blockchain. Finally, we design 2.2 Blockchain Technology Express Transaction and Hollow Block to reduce the usage Blockchain technology has aroused great interests from both of the network resource in blockchain academic and industrial fields, including finance, e-health, distributed system, etc. Christidis et al. [20] presented a 3 FRAMEWORK DESIGN comprehensive survey on blockchain and claimed that the Edges consist of edge infrastructures, base stations, edge serv blockchain can be employed to construct a resilient distrib- ers, and loT edge devices, etc. Every edge links to the network uted system in which participants could interact with each served by different Internet Service Providers(ISPs). In our other without a trusted third party. They demonstrated that proposal, we deploy blockchain on these edges, where ever the combination of blockchain and loT can make significant block contains multiple transaction logs of big data flows improvements. Azaria et al. 121] designed a blockchain among edge applications. For a more clear description of based system called MedRec for electronic medical record proposal, we demonstrate a green blockchain framework in management. In the MedRec, medical stakeholders such as collaborative edges in this section. Our proposed framework medical scientist and public health authorities are involved is divided into four layers, as shown in Fig. 1 as miners. Weber et al. [22] adapted blockchain for business. AI PI layer offers interfaces for edge applications, which The trust of blockchain underpins the international business abstract the functions of cache and blockchain layer to pro- process. The authors performed three case studies to illus- vide various calls for implementing edge collaboration. Sp trate the feasibility of their proposed solution cifically, api layer contains following operations here were several works focusing on the inner mecha- nism of blockchain technologies Saito et al. [23] proposed Read, write, and execute operations abstract transac that blockchain can be regarded as a probabilistic state tion construction in the blockchain layer machine, where the amount of participants is uncertain and Policy configuration is designed to set the operation participants cannot make commitment on the decisions permission to local data for other edge devices Eyal et al. [24] developed a novel Bitcoin-NG (Next Genera Query operation can query operation record of other tion)protocol to improve the scalability, which belongs to a edge devices on local data, where the latest opera- kind of Byzantine fault tolerant protocol. In addition, a set tions of local data are stored in the local operation of metrics standard is introduced to quantify the security modle in cache layer. and efficiency of the blockchain protocols. Lewenberg et al The cache layer is designed to accelerate the responses to [25] designed a Directed Acyclic Graph (DAg)structure for the calls, and it contains local operations, invalidated blocks blockchain to enhance the throughout, where a block could and useful blocks reference many predecessors. Miller et al. [26] proposed a The blockchain layer implements the content of block practical asynchronous Honey Badger BFT protocol. This chain in edges, including several modules as follows protocol can ensure normal operation without any time First, transaction and block construction module assumptions on a wide area network more than 100 nodes transforms the requests from the upper layer into XU ETAL. MAKING BIG DATA OPEN IN EDGES: A RESOURCE-EFFICIENT BLOCKCHAIN-BASED APPROACH entire edge network for validation quite less computational resources than that of Pol requires transactions or blocks, which will be broadcast to the mining. It is a promising replacer of Pow, since it Second, transaction validation module contains vali In addition, Practical Byzantine Fault Tolerant(PBFT) dation rules, where the operation permission to local and its variants are widely used in consortium chains, data is often set for other edge devices via modifying which tolerate up to a third of participants that occur any validation rules. Besides, transaction and block vali- form of failure(Byzantine fault), given the number of partic- dation modules guarantee rules, which are founda- ipants in advance and fixed [381 tions of the green PoC consensus, as we will Within the context of collaborative edges, as mentioned illustrate in Section 4 above, every edge device is a participant of the network, Finally, transaction offloading module locates the and may require to perform blockchain operations More blocks with useful transactions, and then the useful over, the number of edge devices, which should adapt to blocks are updated to the cache layer. This module is the demand of users, is not fixed. As we mentioned in dcsigned to rcducc storage resources occupied by Scction 1, thc blockchain bascd cdge collaboration urges to blockchain pursue a green solution because of the limited computa- Storage layer in the bottom provides persistent storage tional and storage resources. Hence, inspired by pos and ervice for the upper layers PoW, we will illustrate Poc in details in next subsection 4 GREEN POOF-OF-COLLABORATION CONSENSUS 4.2 Proof-of-Collaboration Mechanism MECHANISM Edge devices give the proof of their contribution to collabo ration rather than solvc meaningless mathcmatical puzzle Blockchain is a distributed data structure and every partici pant keeps a copy of the entire blockchain [32 ,[33],[] to obtain the privileges of collaboration the key concept of The first class component in blockchain is named transac- Proof-of-Collaboration is that participants contribute to the big data sharing so that they can also benefit from other par tion, which is a record of some asset transferring. These ticipants collaboration. More specifically, the green poc transactions generated by different devices are validated via a whole blockchain network, and are packaged into a consensus mechanism is designed as followS block by a miner. Then miners keep consistency of blocks validation via performing consensus mechanism. Finally 4.2.1 Collaboration Credit valid block is added to the blockchain In our design, the edge collaboration is underpinned by a new assct called Collaboration Credit(CC), which is slightly similar 4.1 Different Chain Types and Consensus to btC in Bitcoin 33 and ETH (GaS)in Ethereum 39 This The blockchain has two types: a public chain and a conson means that the data flow from edge applications recorded by tium(private) chain. If anyone can participate in a bloc transactions, i.e., collaborations, must be paid using CC in the chain network the blockchain is naturally public or proposed framework. The CC used for this payment is dynam consortium 3 65]. If every participant can take part in block- ically dctcrmincd by collaboration fcc F as chain operations, for example, competing to mine blocks or proposing transactions, the blockchain is public [20]. Since the public chain is open and competitive, the participants in y CC/kB ×m ublic chain nctwork do not trust cach other 36 On the contrary, the participants of a consortium chain network are where y/ is a pre-defined throughput threshold, y/'represents privileged and white-listed the average throughput of the entire network during recent The differences between the two chain types result in dif- 100 blocks, and n denotes the number of edge devices in the ferent kinds of potential applied consensus protocols. Giv- network. The average network throughput y can be calcu ing any participant an opportunity to minc blocks, Proof-of- lated by dividing the total size of transactions in recent 100 Work (pow) makes a great success in Bit soin H hich is the blocks by the time consumption of generating these 100 iggest public chain in the world 133, 134]. Pow requires blocks. In practice, v equals to the maximum value of devices' articipants that compete for mining blocks to give the network capacity. according to the definition of F, the frame proof of their work. This proof is a kind of mathematical work will decrease to encourage collaboration when the puzzle that is casy to bc validated but cxtremcly hard to be recent throughput is lower than the pre-defined threshold,or solved, i. e, solving these kinds of puzzles consumes fabu- increase F to reduce network overload when the throughput lous amount of computational resources. In most cases, the s higher than defined. Moreover, the larger the amount of puzzle has the following form edge devices is, the lower F will be in the framework Find n the framework, CC can be gained by two approaches (1) First, the block proposer can be rewarded a certain number S.t. SHA256(SHA256(.m))< target, of Cc by adding a new block to the blockchain successfully Second, the block proposer earns CC from the transactions here. is a string concatenate operator, and h represents carried by the block. The collaboration fee F is used to eval the content of the newest block. The smaller the target is the uate the contribution, i. e to prevent selfish applications more difficult the mining is. Later, the concept of Proof-of- requesting shared data without sharing their own data. If Stake(pos)[37] has been proposed, and its main idea is that an edge application leverages data flow from other applica stakeholders should show their stake of assets to compete tions, it must contribute to the edge collaboration lEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. VOL 30. NO. 4. APRIL 2019 4.2.2 Proof-of-Collaboration Legen In the framework, the way to propose a block is rclated to O Useful block the persistence p which is defined as the time since the last CC changes Our proposal has the following three core rules, □ Useful transaction Inout I Futile transaction underpinned by CC and P, to guarantee itself a green blockchain Rule 1 dynamic difficulty). The mining in the proposed PoC is different from Eq. (1). Mining in PoC is influenced by dynamic difficulty, which is different from various participants It has the form as follows st.SHA256(SHA256(h.m)月 3210 0 40 20 Block Heigh ght (thousand) Blockchain Height(thousand) Fig 8 Accumulative energy. Fig. 10. Comparison of storage cost 1e14 E-TX+HB 1600 E-TX 1.2 PoC PoW 61400 Traditional 1.0 0.8 200 s0.6 1000 0.4 800 0.2 600 0.0 01000020000300004000050000 0 20 30 Block Size(transactions/Block) Block Height( thousand) Fig. 11. Comparison of throughput Fig 9. Accumulative hashes 300 Traditional e storage cost grows linearly without transaction offload- 艺250 HB ing. Under the control of this offloading module, the storage 200 cost of our green blockchain grows slowly and is stabilized t a low level. This is because the proposed module can rec 第150 ognize the transactions that cannot be further referenced 100 and upload them to the cloud for reducing storage We compare the network throughput of traditional 50 blockchain and blockchain with F-TX and hollow block indicated by IIB)in Fig. 11. The throughput of blockchain with E-TX is 17 percent higher than traditional blockchain Hollow block further enhances the throughput to 23 percent Number of transactions higher than traditional blockchain. The enhancement is Fig 12. Comparison of network usage mainly contributed by the asynchronous validation of f-tX and the redundancy reduction provided by hollow block To show the capability of redundancy reduction we 7.3 Discussion demonstrate the network usage of recording transactions Security limitation. The proposed PoC mechanism reduces into blockchain with hollow block. Fig. 12 shows that the the waste of computational resource, enabling blockchain hollow blocks reduce about 27 percent network usage of a based edge collaboration. Previous work indicates that the single participant by removing the redundancy between security of the Pow protocol is based on the"wasted"com participant's queue and new blocks putation [55]. However, this assert is based on the threat During the experiment, the average latency of submitting model that the adversary aims to control the whole system a transaction is 38 ms, which is lower than the requirement This model considers the blockchain system as an entity, of latency(100 ms [52) in 5G edge and IoT network [531, which actually is an extreme case. In more general models, [54]. For each data sharing operation, the proposed method the adversary is able to start a double-spending attack if he will bring 290 Bytes of communication overhead on aver- owns more computational resource than any of the partici- age. In summary, the results of experiments show that our pants. In this situation, the security performance is deter proposed green blockchain is able to reduce enormous mined by the participant owning the most computational computational, storage, and network resources, which helps resource. Therefore, the security level of Pow and Poc in to solve the critical challenges we describe in Section 1 neral cases can be the same
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 输入关键字,在本站1000多万海量源码库中尽情搜索: