Research article Special Issues

Secure data storage based on blockchain and coding in edge computing

  • Edge computing is an important tool for smart computing, which brings convenience to data processing as well as security problems. In particular, the security of data storage under edge computing has become an obstacle to its widespread use. To solve the problem, the mechanism combing blockchain with regeneration coding is proposed to improve the security and reliability of stored data under edge computing. Our contribution is as follows. 1) According to the three-tier edge computing architecture and data security storage requirements, we proposed hybrid storage architecture and model specifically adapted to edge computing. 2) Making full use of the data storage advantages of edge network devices and cloud storage servers, we build a global blockchain in the cloud service layer and local blockchain is built on the terminals of the Internet of things. Moreover, the regeneration coding is utilized to further improve the reliability of data storage in blockchains. 3) Our scheme provides a mechanism for periodically validating hash values of data to ensure the integrity of data stored in global blockchain.

    Citation: Yongjun Ren, Yan Leng, Yaping Cheng, Jin Wang. Secure data storage based on blockchain and coding in edge computing[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 1874-1892. doi: 10.3934/mbe.2019091

    Related Papers:

    [1] Dawei Li, Enzhun Zhang, Ming Lei, Chunxiao Song . Zero trust in edge computing environment: a blockchain based practical scheme. Mathematical Biosciences and Engineering, 2022, 19(4): 4196-4216. doi: 10.3934/mbe.2022194
    [2] Muhammad Firdaus, Siwan Noh, Zhuohao Qian, Harashta Tatimma Larasati, Kyung-Hyune Rhee . Personalized federated learning for heterogeneous data: A distributed edge clustering approach. Mathematical Biosciences and Engineering, 2023, 20(6): 10725-10740. doi: 10.3934/mbe.2023475
    [3] Yifeng Yin, Zhaobo Wang, Wanyi Zhou, Yong Gan, Yanhua Zhang . Group key agreement protocol for edge computing in industrial internet. Mathematical Biosciences and Engineering, 2022, 19(12): 12730-12743. doi: 10.3934/mbe.2022594
    [4] Yong Zhu, Zhipeng Jiang, Xiaohui Mo, Bo Zhang, Abdullah Al-Dhelaan, Fahad Al-Dhelaan . A study on the design methodology of TAC3 for edge computing. Mathematical Biosciences and Engineering, 2020, 17(5): 4406-4421. doi: 10.3934/mbe.2020243
    [5] Shitharth Selvarajan, Hariprasath Manoharan, Celestine Iwendi, Taher Al-Shehari, Muna Al-Razgan, Taha Alfakih . SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures. Mathematical Biosciences and Engineering, 2023, 20(12): 20828-20851. doi: 10.3934/mbe.2023922
    [6] Shiyou Chen, Baohui Li, Lanlan Rui, Jiaxing Wang, Xingyu Chen . A blockchain-based creditable and distributed incentive mechanism for participant mobile crowdsensing in edge computing. Mathematical Biosciences and Engineering, 2022, 19(4): 3285-3312. doi: 10.3934/mbe.2022152
    [7] Xiao-Dong Yang, Ze-Fan Liao, Bin Shu, Ai-Jia Chen . Blockchain-based multi-authority revocable data sharing scheme in smart grid. Mathematical Biosciences and Engineering, 2023, 20(7): 11957-11977. doi: 10.3934/mbe.2023531
    [8] Miaoshan Lu, Junjie Tong, Weidong Fang, Jinyin Wang, Shaowei An, Ruimin Wang, Hengxuan Jiang, Changbin Yu . Column storage enables edge computation of biological big data on 5G networks. Mathematical Biosciences and Engineering, 2023, 20(9): 17197-17219. doi: 10.3934/mbe.2023766
    [9] Xiao Dong Yang, Wen Jia Wang, Bin Shu, Mei Juan Li, Rui Xia Liu, Cai Fen Wang . Multi-message multi-receiver signcryption scheme based on blockchain. Mathematical Biosciences and Engineering, 2023, 20(10): 18146-18172. doi: 10.3934/mbe.2023806
    [10] Jiayuan Zhang, Rongxin Guo, Yifan Shi, Wanting Tang . An anti-impersonation attack electronic health record sharing scheme based on proxy re-encryption and blockchain. Mathematical Biosciences and Engineering, 2024, 21(6): 6167-6189. doi: 10.3934/mbe.2024271
  • Edge computing is an important tool for smart computing, which brings convenience to data processing as well as security problems. In particular, the security of data storage under edge computing has become an obstacle to its widespread use. To solve the problem, the mechanism combing blockchain with regeneration coding is proposed to improve the security and reliability of stored data under edge computing. Our contribution is as follows. 1) According to the three-tier edge computing architecture and data security storage requirements, we proposed hybrid storage architecture and model specifically adapted to edge computing. 2) Making full use of the data storage advantages of edge network devices and cloud storage servers, we build a global blockchain in the cloud service layer and local blockchain is built on the terminals of the Internet of things. Moreover, the regeneration coding is utilized to further improve the reliability of data storage in blockchains. 3) Our scheme provides a mechanism for periodically validating hash values of data to ensure the integrity of data stored in global blockchain.


    Technological progress such as Internet of Things (IoT), Big Data analytics, cloud computing, machine learning and artificial intelligence in recent years has allowed the design of new Smart computing systems in smart environments aiming to facilitate users' lives. Smart computing is widely used in transportation, energy, environmental protection, smart city, healthcare, entertainment, and social media.

    In smart computing, more and more applications are putting large amounts of data into cloud servers for computing or storage. And it can solve the problem of limited storage capacity and insufficient computing speed of intelligent terminals and other devices. In addition, users do not need to care about the specific structure, management mode and maintenance of computing and storage, nor need to worry about the technical issues such as expansion and fault tolerance under the cloud computing environment. They only need to buy from Cloud Storage Provider (CSP) as required, just like buying water, electricity and gas [1, 2, 3].

    As the trend of Internet of things deepens, the number of terminals such as smartphones and smart glasses keeps increasing, making the growth rate of data far exceed the growth rate of network bandwidth. At the same time, many new applications, such as augmented reality and unmanned driving, put forward a higher demand for delay. According to the forecast of Cisco cloud index (GCI) in 2016, global data center traffic will reach 15.3 ZB by 2020. The Internet business solutions group (IBSG) also forecasts that the number of IoT devices will reach 50 billion by 2020 [4, 5]. The interconnection of all things breaks the limit of the interconnection between the traditional things, which results in that the traditional cloud computing model cannot meet the application demand of the interconnection of all things [6, 7].

    There are three main reasons why cloud computing model cannot meet the application demand of Internet of everything [8, 9, 10].

    (1) Multi-source heterogeneous data processing. The perception layer data of the Internet of things is at a massive level, and there are frequent conflicts and cooperation between the data, with strong redundancy, relevance, real-time and multi-source heterogeneous characteristics. The integration of heterogeneous multi-source data and real-time processing demands brings great challenges to cloud computing which cannot be solved.

    (2) Bandwidth load and resource waste. Cloud service is a kind of centralized service computing with high degree of agammaegation. Users send data to the cloud for storage and processing, which will consume a large amount of network bandwidth and computing resources. At the same time, a large number of user visits will increase network traffic, which will lead to service interruption, network delay and other problems.

    (3) Limited resources. In the interconnection mode of everything, network edge devices are usually resource-limited (storage, computing capacity, battery capacity, etc.), and the energy consumption of long-distance transmission of data between edge devices and cloud computing centers is particularly prominent.

    Due to the contradiction between the cloud computing model and the inherent characteristics of the Internet of everything, the centralized computing processing mode of cloud computing alone is insufficient to support the application operation and mass data processing in the context of the perception of the Internet of things. Moreover, cloud computing model has been unable to effectively solve problems such as cloud central load, transmission broadband and data privacy protection. Edge computing can effectively solve these problems. Edge computing is a new service model in which the data or task can be calculated and performed at the edge of the network near the data source.

    In the edge network, any functional entity between the data source and the cloud computing center can run the edge computing platform of computing, storage and application of core capabilities, providing the end users with real-time, dynamic and intelligent service computing. Moreover, the combination of edge computing and existing cloud computing centralized processing model can effectively solve the problem of big data processing of cloud center and network edge [11, 12, 13].

    Because edge computing can be combined with cloud computing, its network structure is usually fixed mode combining centralized with distributed mode. Therefore, its data storage mechanism is different from the traditionally centralized storage mechanism of cloud computing, as well as the common local storage and distributed storage mechanism. This article develops special research for this purpose. Our contribution is as follows.

    (1) We propose a hybrid storage architecture that adapts to edge computing.

    (2) We make full use of the advantages of edge network devices and cloud storage servers to make full use of their resources and avoid the waste of resources.

    (3) We propose to use blockchain technology for data storage, which ensures the security of data storage in edge computing.

    Intelligent computing combined with Internet of Things (IoT), big data analytics, cloud computing, machine learning and artificial intelligence has many applications. For example, smart medical care collects body information, temperature, nutrition, humidity and motion information through IoT sensors, which are uploaded to the cloud server. When thousands of pieces of information form a big data database, cloud computing resources are used to perform powerful machine learning and artificial intelligence calculations to process this information. Ultimately get a report on human health, a healthy diet and a reasonable exercise recommendation, pre-symptom prediction of the disease, etc. [14, 15].

    Edge computing is also an important component of smart computing. The "edge" in edge computing is a relative concept that refers to any computing resource and network resource between the data source and the cloud service center. Edge computing allows terminal devices to migrate storage and computing tasks to network edge nodes, such as base station (BS), wireless access point (WAP), edge server, etc., which satisfies the computing power of the terminal equipment to expand demand and effectively saves computing tasks at the same time in the cloud resources transmission link between the server and terminal equipment. The architecture of Edge computing is shown in Figure 1, which mainly includes Cloud Layer, Edge Layer and IoT Layer [16].

    Figure 1.  Architecture of edge computing.

    (1) Cloud Layer mainly includes Cloud computing services and data centers. Cloud computing core services typically include three service patterns: infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS). Meanwhile, in the edge computing service mode, multiple cloud service providers are allowed to provide centralized storage and computing services for users at the same time. Therefore, large-scale computing migration between servers can be achieved by deploying multiple layers of heterogeneous servers, and real-time services and mobile agents can be provided to users in different geographic locations.

    (2) Edge Layer: Edge Center is responsible for virtualization services and multiple management services. It is one of the core components in Edge computing, deployed by infrastructure providers, and equipped with multi-tenant virtualization infrastructure. Virtualization services provided by edge data centers can be used from third-party service providers to end users and infrastructure providers themselves. In addition, the edge side of the network tends to deploy multiple edge data centers which cooperate with each other while acting autonomously, but not disconnected from the traditional cloud. Therefore, it is possible to create a layered architecture interconnected by different network infrastructures to achieve a distributed collaborative computing service pattern. It is worth mentioning that the data security of the edge data center is always a concern of the end users [17].

    (3) IoT Layer: edge network computing realizes the interconnection of IoT devices and sensors by integrating multiple communication networks from wireless network to mobile central network to Internet network. Mobile terminals in the IoT include all types of devices connected to the edge network (including mobile terminals and numerous IoT devices). They are not only the identity of the data consumer, but they can act as data providers participating in distributed infrastructure at all levels [18].

    Due to the increase of data volume and the demand of real-time processing, the centralized data processing of cloud center will be transformed into the two-way computing mode of cloud and edge. Network edge devices not only act as service requesters, but also perform some computing tasks, including data storage, processing, search, management and transmission.

    In recent years, smart computing technology has been widely used in many fields such as pattern recognition and artificial intelligence. With the implementation of the human genome project and the completion of more biological genome sequencing projects, the biological data are explosive and the traditional experimental determination methods are far from meeting the needs. The computational intelligence algorithm in smart computing has its unique advantages in the field of processing this kind of data with large volume, noise pattern and lack of unified theory. Edge computing is an important tool in intelligent computing which has a wide range of applications in biological genetics and intelligent medicine.

    Recent research shows that edge computing can provide nearby computing services, but generally only some simple data processing. For the sequencing industry, edge computing can assist in the preprocessing of some sequencing computations. Imagine the future, if you can realize the edge computing, the gene sequencing model will change, it will not send blood samples directly to a center again, instead of that the front end will do the pretreatment, the data of the pretreatment will transferred to the corresponding 'brain' when it need to be analyzed, and the analysis of the work is the core value. The new theories and technologies, such as intelligent edge computing, are bringing disruptive changes to tumor radIoTherapy, and breakthroughs will be made in the accuracy and efficacy of treatment. Intelligent omics radIoTherapy is expected to solve the dilemma faced by radIoTherapy for many years.

    Data storage of internet of things can be divided into centralized storage, distributed storage and sensor network database. These strategies are discussed below, and their data storage and access costs are analyzed [18].

    Centralized storage [19, 20, 21, 22] is the simplest data storage strategy. Each node transfers the collected perception data to the base station (sink node) for storage, while the data access directly obtains the data from the base station. Because the energy and storage space of the base station is not limited, the data can be stored for a long time and the data access does not consume the energy of the nodes in the network. At this point, the sensor network is only a means of data collection rather than data processing, because users can only get data from the base station database. In addition, when the network scale is large and the nodes are distributed densely, a large amount of data in the network needs to be transmitted. The nodes near the base station will consume energy too fast for forwarding data, which constitutes a bottleneck for the entire network. So it is not suitable for large-scale network.

    All nodes in the centralized storage send data to the base station, and the cost of data access to the base station is negligible. So the total cost isO(nn), where the base station receives data of all nodes at the same time. And the maximum cost of a single node isO(n).

    Distributed storage [23, 24, 25, 26] is a data-centric storage strategy. Its core idea is that the perceptual data generated by the node is not necessarily stored locally, but stored in other nodes using distributed technology. And an effective information intermediary mechanism is used to coordinate the relationship between the data store and data access to ensure that the data access request can be met. Under this policy, the data is stored according to the specific storage mechanism, and the query request also depends on the specific access mechanisms to obtain the data. These mechanisms include hash mapping, indexing, routing data and query requests by certain rules and so on. The advantage is that the distributed data storage well matches the distribution of the sensor network itself and the information mediation mechanism can guarantee that the data access request is met, while the disadvantage is that the information mediation requires additional costs.

    In distributed storage, since the data is stored in s locations, the storage cost isO(snn). The query request must send any of the s locations at the cost ofO(n/s). If a node satisfies the query condition, the feedback cost isO(n). When data store and query access intersect a single node, the maximum cost is O(n)+RQuery.

    Sensor network database [27, 28, 29] sets above three strategies as a whole which means closely combined traditional database technology, distributed technology and network technology, integrated the sensor nodes as perceptual data flow or data source and considered wireless sensor network as distributed perception database. From the logic concept, a data-centric sensor network database system with high performance was achieved [4]. Sensor network databases and data-centric routing complement each other. Routing is a bottom-up mechanism relative to data storage and access, while database relative data modeling and access is a top-down mechanism. Typical sensor network databases include OUGAR, Tiny-DB, PRESTO and StonesDB [30].

    In edge computing environment, a large number of sensor nodes are usually deployed. The sampling data of most sensors (such as temperature sensor, GPS sensor, pressure sensor, etc.) is numerical, but there are also many sensors whose sampling values are multimedia data (such as traffic camera video data, audio sensor sampling data, remote sensing imaging data, etc.). Each sensor generates new sampling data frequently, and the system needs to store the latest version of the sampled data, and in most cases that all historical sampling values within a period of time such as one month in order to meet the requirements of traceability processing and complex data analysis. Since the data is massive, data storage will be an unprecedented challenge.

    The same IoT systems can contain a variety of sensors, such as traffic sensor, hydrological sensors, geological sensors, meteorological sensors, biological medical sensors, etc. And each kind of sensors includes a number of specific sensors, which can be subdivided into GPS sensors, license plate recognition sensors, electronic photographic identification sensors, traffic flow sensors (infrared, coil, optics, video sensor), road sensors, sensors in perfect condition, etc. These sensors not only have different structures and functions, but also collect heterogeneous data. This heterogeneity greatly increases the difficulty of data storage. In addition, more complex traditional encryption algorithms, access control measures, identity authentication protocol and privacy protection methods cannot be applied in edge computing, on the one hand, because of the multi-source data fusion characteristics of edge computing and the superposition of mobile and Internet networks; on the other hand, there are resource limitations in storage, calculation and battery capacity of edge terminals.

    Although edge computing has some locally or proximally advantage, it faces more serious security problems [31]. First of all, edge computing covers a lot of terminal devices, which have potential security problems. For example, 82% of Android devices have at least one of the 25 security vulnerabilities. Secondly, the network access of terminal devices in edge computing is diverse, and the security of these networks is difficult to guarantee, making them more vulnerable to attack. According to statistics, 80% of home routers use the default password and 89% of public wi-fi hotspots are unsafe. In addition, in edge computing, nodes are distributed across the local network and cloud, making it more difficult to implement security protection across domains. Moreover, some of the sensing equipment has very limited resources, which makes many of the existing security protection technologies unavailable for direct use.

    Blockchain is a kind of decentralized, tamper-resistant, traceability, jointly safeguard of distributed database. It can integrate traditional single-party maintenance of multiple isolated databases involving only its own business and distributed storing multiple nodes that are jointly maintained by multiple parties. Neither party can fully control these data which can only be updated according to strict rules and consensus, thus achieving trusted information sharing and supervision among multiple parties in an untrusted environment [32, 33, 34]. With the application of blockchain technology, trusted information can be shared among multiple parties without any third-party trusted institutions. Blockchain technology is well suited for edge computing where security demands are strong. However, the blockchain network is a completely distributed architecture, while the edge computing environment is a centralized distributed architecture. How to use blockchain technology for secure data storage in edge computing has become an outstanding problem that needs to be studied.

    In storage systems, redundancy is often introduced to improve system reliability. As an important redundant strategy, erasure code strategy gets more and more attention. Common remedy delete code for (n, k) maximum distance separable (maximum short separable, MDS) code, such as Reed - Solomon code. When data loss occurs to a storage node, the original data can be restored through redundant coding. Usually, when a node restores lost data, the amount of data transmitted is greater than the storage capacity of the node [35]. This results in huge bandwidth consumption.

    To solve the problem of erasure code, Dimakis et al. proposed the regenerative code of optimized repair bandwidth [36]. As an improvement of erasure code, regenerative code not only maintains the property of erasure code MDS but also greatly reduced the network bandwidth required in the repair of failed data by introducing the concept of network coding [37, 38, 39, 40]. Based on the regeneration code and blockchain, this paper constructs the data security storage mechanism in the edge computing environment.

    The data storage model in the edge network is shown in Figure 2. The storage model is divided into three layers and corresponding different components: (1) cloud server group, (2) global blockchain network, (3) edge network center, (4) local blockchain, (5) IoT terminal equipment.

    Figure 2.  The model of data storage based on blockchain in edge computing.

    (1) Cloud server cluster

    In edge computing, the top layer is the cloud service layer. In the cloud service layer, there are a large number of cloud servers, which can provide the function of cloud storage service. Users can easily access data at anytime and anywhere, through any internet-connected device connected to the cloud. More importantly, the cloud server cluster has a large number of storage resources, which can provide infinite storage space for the edge networks with limited resources [41].

    (2) Global blockchain network

    To ensure the security of the data stored in the cloud server, we build a global storage mechanism based on blockchain technology. Each cloud storage server has a copy of the data block and can verify and store the data through the block structure, and use the consensus algorithm of distributed cloud storage server to generate and update the data.

    In addition, in order to further improve the reliability and security of data, we use regenerative code to provide data redundancy. When a data loss error occurs in a cloud storage server, it can be recovered again by redundant regeneration code. Further, improve the reliability of cloud storage servers.

    (3) Edge Center

    Edge Center is part of the Edge network that manages a set of IoT network devices. These IoT network devices form an edge network. IoT network devices with limited resources and capabilities are managed by the Edge Center and do not prevent them from participating in Edge networks due to their hardware limitations. At the same time, Edge Center is responsible for interacting with the upper layer cloud server, and transferring data and information in the local Edge network periodically to the cloud server for storage.

    Any entity can be registered as an IoT network device. However, IoT network devices must be registered under the control of the Edge Center in order to avoid edge network devices being added to edge networks without the permission of edge center nodes. In addition, all registered IoT network devices in the system must belong to an edge center. Otherwise, no node can manage the device [42, 43].

    (4) Local blockchain

    The Edge Center, along with the IoT network devices it manages, builds a local blockchain that stores the data collected by each IoT network device. Local blockchain is a lightweight blockchain due to the limited storage resources of IoT network devices. When the data stored in the local IoT device reaches the upper limit, the data is hashed. And the data is transmitted and stored to the local blockchain. At the same time, data in IoT devices will be deleted. Thus, IoT network devices can collect data again.

    (5) IoT terminal equipment

    In edge computing, various objects can be connected to the Internet through intelligent and non-intelligent sensors, so that intelligent applications such as information collection, environmental monitoring and health management can be realized [44, 45]. The basic core is the information interaction between objects and objects as well as between people and objects. It extends the communication dimension of people in the world of information and communication technology from any time, any place, and any connection to anyone, to any connection to any object. Everything is connected via the Internet to form the Internet of things [46].

    In the cloud service layer, there are many cloud servers which can be considered to have infinite storage space and can be used to store all data in the edge computing environment. However, although cloud storage brings convenience and economic benefits to users, but it also poses serious threats to users' data security. Particularly it brings many new challenges in guaranteeing the integrity and correctness of user data. Due to the influence of hardware, software, operating system or human operation, cloud server will inevitably change or even delete users' data by mistake. Therefore, data security has become the biggest obstacle to the further development of cloud storage services.

    To this end, the system adopts the blockchain technology to directly build the global blockchain in the cloud storage server and store the data sent from each Edge Center. Blockchain technology has the characteristics of decentralization, non-tampering and trust removal of block data, which make the storage of the data more secure. Moreover, this system adopts the structure of cloud, and constructs the structure of distributed storage. Distributed data storage can further improve system reliability, availability and access efficiency, and is easy to expand.

    At the same time, in order to further improve the reliability of the data, this paper continued to adopt the regenerative code technology in the cloud storage and carried out redundant coding and storage of the original data. It is shown in Figure 3.

    Figure 3.  Data storage based on global blockchain in cloud layer.

    In general, the storage system based on erasure code is to cut the original file into k original data blocks, then encode them and form n coding blocks. These coding blocks are stored in n different storage nodes. When the original data needs to be restored, k coding blocks are obtained from any k storage nodes and then decoded to recover the original data. Erasure code is much less expensive to store than multiple copies at the same fault tolerance. However, when repairing the failed data, erasure code needs to transfer k blocks from k nodes. The erasure code strategy increases network overhead compared to the multi-copy policy which only transmits 1 data block.

    In regenerative code, each node stores a coding block composed of a coding segment. When repairing, the coding segment is firstly combined in a linear manner on the node providing the recovery data, so as to obtain the restoration block composed of b (b is far less than a) repair segments and then the restoration block is transmitted to the newborn node. The new node then decodes the collected repair blocks to get the invalid coding blocks. Although the number of connection nodes is greater than k, the regenerative code does not need to download the entire coding block. Therefore, the regenerative code fundamentally reduces the amount of data transmitted.

    Regenerative codes can greatly reduce the amount of data transmitted when repairing, but the amount of data that needs to be read is much larger. Therefore, based on blockchain, this paper adopts the combination of data duplication and regenerative code technology to improve the reliability of data storage.

    When data is stored in a cloud environment, the original data k is encoded and stored on n cloud servers, and each cloud server stores the encoded data with size of aps. When a cloud server fails, it can connect any of the remaining n-1 cloud servers to download d landscape for repair, which is called Repair Bandwidth. The parameter set of the regenerative code scheme can be expressed as {[n, k, d], (yes, yes, B)}, and its average repair bandwidth d is smaller than file size B. The Minimum Bandwidth restate-owned (MBR) Code has the lowest repair Bandwidth. The amount of data that needs to be stored during the data repair process of commonly used MBR code is too large, which increases the disk load of the system and limits the speed of the repair. Repair by Transfer (RBT) Code can only transmit data without any mathematical calculation when data is restored, so the amount of data to be read is the same as the amount of data to be transferred, which is more suitable for use in the storage system. Therefore, this system adopts RBT.

    Suppose M and is a data matrix, and its form is as follows:

    M=[S  T-Tt  0]

    Where 0 is the zero vector of (n-k)×(n-k), T is the filling vector of k×(n-k), and S is an antisymmetric matrix. Antisymmetric matrix has the following properties: S=-St. As a result, S[i, j]=-S[j, i]. The coding matrix ψ=[ϕ Δ] is a matrix of n×n, where 0 in the Δ=[0Ink] is the zero vector, and In-k is the identity matrix. Thus, RBT is encoded as C=ϕMϕt. Its symmetric matrix is C'. Let's say that for every behavior in matrix C, we have

    cj={cj[i] ijcj[i] i<j

    The minimum repair bandwidth point in MBR codes is: (α,β)=(2Bd2kdk2+k,2Bd2kdk2+k). Because the system uses blockchain technology, it can use the copy of the blockchain stored in other cloud servers for data repair. Therefore, only the repair data of (k-1) coding nodes is needed in data repair. In the case that data copies exist, according to literature [] : C(α)=B+k2i=0min{bi,α}, α[0,bk2],bi=(1k2idβ).

    Therefore,

    C(α)={B+(k1)αα[0,b0]B+b0+(k2)αα(b0,b1]LB+b0++bk3αα(bk3,bk2]

    The minimum value satisfying C(α)≥B is

    α={Bk1B[B,B+(k1)b0]Bi1j=0bjk1iB[B+i1j=0bj+(ki1)bi1,B+i1j=0bj+(ki2)bi]

    In addition, i1j=0bj=i1j=0(1kj2d)β=βi[dk+2d+i12d]=βg(i) there are:

    i1j=0bj+(ki2)bi=i1j=0(1kj2d)β+(ki2)(1k2id)β=β(i+1)[dk+2d+i12d]+(ki2)(d+2kd+id)β=β((k1)(dk+2)d+(2ki3)2d)

    From above: α=Bg(i)βki1. Therefore, the minimum repair bandwidth point with data copy is:(α,β)=(2Bd(2dk+2)(k1),2Bd(2dk+2)(k1))

    The IoT layer is a mass of sensors that sense information, work together to build local networks and connect disparate objects to the Internet. Compared with Edge Center and cloud server, a large number of IoT terminals have limited resources in storage, communication and computing. Thus, this paper proposes that each IoT network builds local blockchain.

    Any IoT device in our system can store an encoded fragment of each data block. Even if each data block is not stored in its original form, each block is completely stored in a different IoT device, and each IoT device stores different fragments. In most cases, the initial block can be restored by combining any k code fragments provided by any node in the IoT network.

    Most IoT terminals are sensors with very limited power. To some extent, the energy determines the performance of the local IoT network. Therefore, this paper proposes that energy - aware coding is applied to the data storage of local blockchain. In the process of information transmission in the local IoT network, when the intermediate node i sends the data, we hope to select the node with the most remaining energy in the neighbor node of i to send in order to reduce the probability of premature exhaustion of the energy of the next hop node. According to literature [], the current average residual energy(ARE) of each network device is as follows: Are(j)=N(i)RE(j)/kN(i)RE(k). N(I) refers to the number of neighbor nodes of node i. The ARE of network device is the relative value of the average residual energy in all the neighboring nodes of its previous hop node. By using the relative residual energy, a more enough node can be selected as the network device of information transmission in multiple nodes with sufficient energy which can be used for encoding and recovery of lost data. It is shown in Figure 4.

    Figure 4.  Data storage based on local blockchain in IoT layer.

    The scheme of the IoT terminal equipment with high residual energy to collaborate on coding and data repair is as follows. The source file M is divided into many blocks and distributed on k local terminal devices, and the data of each local terminal device is divided into k parts. These nodes form a k by k matrix M1, and MiT (I = 1, 2... K), each column in the matrix M1 represents the data information of each local terminal. The matrix M1 is:

    M1=[a11a12a1k1a1ka21a22a2k1a2kak1ak2akk1akk] (6)

    In order to increase the reliability of the system, the data of the source file is coded with the same code to generate n-k redundant terminal equipment. The data structure of redundant terminal equipment is represented by the k×n order matrix M2, and each column MiT (i=k+1, …, n) represents the data information of each redundant terminal equipment. The matrix M2 is:

    M2=[a1k+1 a1k+2  a1na2k+1 a2k+2  a2n akk+1 akk+2  akn]

    All the storage codes in matrix M1 and M2 constitute a complete local network data storage system. When some nodes are damaged, it uses d local terminal devices to fix the data on these terminals. The data size that each node needs to download is the β, and the total number of data MiT that needs to be transmitted is d-1, to form the k×(d-1) order matrix. All the data used to repair the node is concentrated on the repair device, and the data used to repair the failed node is the k×d order matrix, and set as C. The linear relationship between the repaired data γ of each terminal device and the data size of the terminal is expressed as the matrix of initial α × γ infinite matrix N(i) (2≤in-k). Through linear calculation, the recycled data of each size α is finally obtained, which is represented by the matrix M':

    M=[N1N2N3 ]C

    The data downloaded from recovery node is ki=1(di1j=0lj)β>0, so there is the following formula: kα+ki=1(di1j=0lj)β>kα.

    Our blockchain scheme includes the local blockchain and global blockchain. Local blockchain is created by edge centers. And they store the data collected by IoT devices and its the hash value. And global blockchain stores all data block. Data in local blockchains is periodically uploaded to the global blockchain. Our scheme provides a mechanism for periodically validating hash values of data to ensure data integrity. One hash value is calculated from data in global blockchain, the other is from local blockchains.

    At first, each IoT device of local edge network will be authenticated by its manager (edge center). The legal devices will be assigned a public-private key pair. A local blockchain is created by edge centers. Devices without public-private key pairs assigned by edge center cannot participate in the local blockchain.

    All IoT devices of the edge network can collect data. When the collected data reaches the upper limit of an IoT device, the hash values of the data blocks are calculated. The hash values of the collected data is signed using the private key that distributed by the edge center.

    And the hash values are broadcast to edge network for verification. After validation, the hash values are written to the local blockchain. The hash values can construct a Merkle tree. The root of the Merkle tree is included in the head of local blockchain. Moreover, the data is sent to edge center to storage. That is to say, the edge center is the global node of the local blockchain; while the IoT devices are the light nodes.

    After the IoT device empties the stored data, it will be able to collect data again. The specific process is shown in Figure 5.

    Figure 5.  Data transfer of Local blockchain.

    Data in local blockchains can be periodically uploaded to the global blockchain. The data uploaded by edge center is divided into blocks. Then, the hash values of data blocks are calculated by cloud servers. The hash values are compared with the hash values stored in the local blockchain to ensure that the data is not changed when uploaded to the cloud server. The specific process is shown in Figure 6.

    Figure 6.  The verify of the cloud server.

    The detailed procedures:

    (1) Data in local blockchains is periodically uploaded to the global blockchain.

    (2) The cloud servers compute the hash values uploaded to the global blockchain. Edge center compares the hash values with the hash values stored in the local blockchain. If they are equal, the data written to the global block chain is correct.

    (3) After validation, the hash values are written to the global blockchain. The hash values can construct a Merkle tree. The root of the Merkle tree is included in the head of global blockchain.

    (4) The verification process of the hash values mentioned above can be carried out periodically to ensure the integrity of data in the global blockchain.

    We use Aliyun and Amazon S3. Compared with single cloud storage service, the response time of distributed cloud storage service composed of multiple cloud storage services is more stable and faster. This is because blockchain-based cloud storage provides multiple copies of data and is able to leverage the network bandwidth of multiple cloud storage services, overcoming the bandwidth shortfalls of a single cloud server.

    In the case of blockchain-based replica repair, the repair bandwidth and disk I/O are reduced when using regenerative code to repair failed data. And as the redundancy m increases, it helps to repair the reduction in bandwidth and disk I/O. In addition, m can be effectively reduced for both average repair bandwidth and average disk I/O. When m=i, as a1 decreases, n increases, and n0 grows the fastest.

    Because: n=(δa1/(km)+(δ2a1+4a1(km))/(km)2a1)2×(km)+m, δis the standard deviation of the normal distribution of the desired availability level. As a result, the bandwidth and disk I/O required to repair will be significantly reduced for highly available cloud storage devices. If the server is less available, you can introduce a high availability server as a replica repair node to avoid large β that consume large amounts of storage space. In addition, because average repair bandwidth is proportional to total storage, a decrease in average repair bandwidth also means a decrease in total storage. Therefore, in the regeneration code, because the α' doesn't change, the increase of m will lead to the increase of total storage, the maximum increase(β-1)'.

    Given that our system can significantly reduce the amount of storage required by nodes without significantly increasing CPU decryption, running blockchain on IoT devices is a very important step. We tested local blockchain and encoded data recovery based on remaining energy at Raspberry Pi. Raspberry pie is a small, single-board computer with the same hardware architecture of common IoT devices and smartphones, which perfectly reflects the processing power of average IoT devices or smartphones in experiments. Common coding algorithms don't often implement parallel computing, so you can easily increase the speed by using four threads of a quad-core ARM processor on Raspberry Pi.

    The hash values calculation and the Merkle tree construction are efficient, which donot require too much computing and storage resources [29, 33, 35]. In order to analyze the influence of the heterogeneity of nodes' computing power on the data repair process, we tested the influence of node residual energy coefficient and node's transmission and repair time on data. In the actual test process, the higher the value of ARE, the longer time the node can process the information and data; On the contrary, the shorter. Figure 7 shows how the repair time of the whole process changes with the remaining energy. The larger the residual energy value is the more stable the node is, and the longer the data processing time is.

    Figure 7.  Influence of ARE on data recovery and data transport.

    The security of data storage under edge computing has become an obstacle to its widespread use, which also affects the development of smart computing. In the paper, the mechanism combing blockchain with regeneration coding is proposed to improve the security and reliability of stored data under edge computing. At first, according to the three-tier edge computing architecture and data security storage requirements, hybrid storage architecture and model under edge computing are proposed. Secondly, making full use of the advantages of edge network devices and cloud storage servers, a global blockchain in the cloud service layer is built. In addition, the regeneration coding is utilized to further improve the reliability of data storage. Moreover, the local blockchain is built on the terminals of the Internet of things which realized the second verification. After the data is stored in the cloud, it can be compared and verified with the data in the local blockchain which further ensuring the data security. According to the residual energy of nodes, the terminals are selected, who are repaired with recovering data through regeneration coding. Thus, the resources of each device under edge computing can be fully developed and the waste of resources can be avoided.

    This work is supported by the NSFC (61772280, 61772454, 61811530332, 61811540410), the PAPD fund from NUIST. Professor Jin Wang is the corresponding author.

    All authors declare no conflict of interest in this paper.



    [1] A. Khan, M. Othman, S. Madani, et al., A survey of mobile cloud computing application models, IEEE Commun. Surv. Tut., 16 (2014), 393–413.
    [2] G. Dan, K. Jeremy, S. Evan, et al., Cloud-Trust-a security assessment model for infrastructure as a service (IaaS) clouds, IEEE T. Cloud Comput., 5 (2017), 523–536.
    [3] J. Wang, Y. Cao, B. Li, et al., Particle swarm optimization based clustering algorithm with mobile sink for WSNs, Future Gener. Comp. Sy., 76 (2017), 452–457.
    [4] S. Li, L. Xu, S. Zhao, et al., Internet of things: A survey, J. Ind. Inf. Integr., 10 (2018), 1–9.
    [5] P. Ray, A survey on Internet of Things architectures, J. King Saud University-Comput. Inf. Sci., 30 (2018), 291–319.
    [6] L. Bittencourt, R. Immich, R. Sakellariou, et al., The Internet of Things, fog and cloud continuum: integration and challenges, Internet. Things, 4 (2018), 134–155.
    [7] R. Olaniyan, O. Fadahunsi and M. Maheswaran, Opportunistic edge computing: concepts, opportunities and research challenges, Future Gener. Comp. Sy., 89 (2018), 633–645.
    [8] P. Hu, D. Sahraoui and H. Ning, Survey on fog computing: architecture, key technologies, applications and open issues, J.Netw. Comput. Appl., 98 (2017), 27–42.
    [9] S. Ola, E. Imad and C. Ali, IoT survey: an SDN and fog computing perspective, Comput. Netw., 143 (2018), 221–246.
    [10] J. Zhang, Y. Zhao, B. Chen, et al., Survey on data security and privacy-preserving for the research of edge computing, J. Comm., 39 (2018), 1–21.
    [11] T. Taleb, K. Samdanis, B. Mada, et al., On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration, IEEE Commun. Surv. Tut., 19 (2017), 1657–1681.
    [12] M. Marjanović, A. Antonić, I. Podnar, et al., Edge computing architecture for mobile crowdsensing, IEEE Access, 6 (2018), 10662–10674.
    [13] D. Zeng, Y. Dai, F. Li, et al., Adversarial learning for distant supervised relation extraction, Comput. Mater. Con., 55 (2018), 121–136.
    [14] Y. Tu, Y. Lin, J. Wang, et al., Semi-supervised learning with generative adversarial networks on digital signal modulation classification, Comput. Mater. Con., 55 (2018), 243–254.
    [15] C. Yin, J. Xi, X, Sun, et al., Location privacy protection based on differential privacy strategy for big data in Industrial Internet of Things, IEEE T. Ind. Inform., 14 (2018), 3628–3636.
    [16] S. N. Shirazi, A. Gouglidis, A. Farshad, et al., The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective, IEEE J. Sel. Area. Comm., 35 (2017), 2586–2595.
    [17] E. B. Tirkolaee, A. A. R. Hosseinabadi, M. Soltani, et al., A hybrid genetic algorithm for multi-trip green capacitated arc routing problem in the scope of urban services, Sustainability, 10 (2018), 1–21.
    [18] W. D. Wang and J. Y. Lang, Reflection and prospect: precise radiation therapy based on bionomics/radionics and artificial intelligence technology, Chinese J. Clin. Oncol., 45 (2018), 30648–30656.
    [19] R. Khanna, H. Liu and T. Rangarajan, Wireless data center management: sensor network applications and challenges, IEEE Microw. Mag., 15 (2014), S45–S60.
    [20] C. Yang, D. Puthal, S. Mohanty, et al., Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks, IEEE Consum. Electr. M., 6 (2017), 48–56.
    [21] J. Wang, C. Ju, H. Kimet, et al., A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs, Cluster Comput., 3 (2017), 1–9.
    [22] R. Meng, S. Rice, J. Wang, et al., A fusion steganographic algorithm based on faster R-CNN, Comput. Mater. Con., 55 (2018), 1–16.
    [23] B. Gong, P. Cheng, Z. Chen, et al., Spatiotemporal compressive network coding for energy-efficient distributed data storage in wireless sensor networks, IEEE Commun. Lett., 19 (2015), 803–806.
    [24] Y. Yang, J. Miao, Y. Zhao, et al., Distributed information storage and retrieval in 3D sensor networks with general topologies, IEEE ACM T. Network., 23 (2015), 1149–1162.
    [25] J. Wang, J. Cao, S. Ji, et al., Energy-efficient cluster based dynamic routes adjustment approach for wireless sensor networks with mobile sinks, J. Supercomput., 73 (2017), 3277–3290.
    [26] L. Xiang, Y. Li, W. Hao, et al., Reversible natural language watermarking using synonym substitution and arithmetic coding, Comput. Mater. Con., 55 (2018), 541–559.
    [27] O. Diallo, R. Joel, M. Sene, et al., Distributed database management techniques for wireless sensor networks, IEEE T. Parall. Distr., 26 (2015), 604–620.
    [28] A. Al-Dhaqm, S. Razak, S. H. Othman, et al., CDBFIP: common database forensic investigation processes for Internet of Things, IEEE Access, 5 (2017), 24401–24416.
    [29] Y. Ren, Y. Liu, S. Ji, et al., Incentive mechanism of data storage based on blockchain for wireless sensor networks, Mob. Inf. Syst., 2018 (2018), 1–10.
    [30] S. Fang, L. Xu and Y. Zhu, An integrated system for regional environmental monitoring and management based on Internet of Things, IEEE T. Ind. Inform., 10 (2014), 1596–1605.
    [31] D. E. Kouicem, A. Bouabdallah and H. Lakhlef, Internet of things security: A top-down survey, Comput. Netw., 141 (2018), 199–221.
    [32] C. Wei, Z. Wang, E. Jason, et al., Decentralized applications: the blockchain-empowered software system, IEEE Access, 6 (2018), 53019–53033.
    [33] F. Tschorsch and B. Scheuermann, Bitcoin and beyond: a technical survey on decentralized digital currencies, IEEE Commun. Surv. Tut., 18 (2016), 2084–2123.
    [34] R. B. Uriarte and R. D. Nicola, Blockchain-based decentralized cloud/fog solutions: challenges, opportunities, and standards, IEEE Commun. Standards Mag., 2 (2018), 22–28.
    [35] K. Govinda, P. Nin, V. Lalitha, et al., Codes with local regeneration and erasure correction, IEEE T. Inform. Theory, 60 (2014), 4637–4660.
    [36] J. Yao, K. Zhang, Y. Yang, et al., Emergency vehicle route oriented signal coordinated control model with two-level programming, Soft Comput., 22 (2018), 4283–4294.
    [37] Y. Hu, L. Patrick, K. W. Shum, et al., Proxy-assisted regenerating codes with uncoded repair for distributed storage systems, IEEE T. Inform. Theory, 64 (2018), 2512–2528.
    [38] Y. Chen, L. Wang, X. Yan, et al., Mimic storage scheme based on regenerated code, J. Commun., 39 (2018), 21–34.
    [39] J. Wang, C. Ju, Y. Gao, et al., A PSO based energy efficient coverage control algorithm for wireless sensor networks, Comput. Mater. Con., 56 (2018), 433–446.
    [40] J. Wang, Z. Zhang and B. Li, An enhanced fall detection system for elderly person monitoring using consumer home networks, IEEE T. Consum. Electr., 60 (2014), 23–29.
    [41] Y. Ren, J. Shen, D. Liu, et al., Evidential quality preserving of electronic record in cloud storage, J. Internet Technol., 17 (2016), 1125–1132.
    [42] X. Li, A fast and exhaustive method for heterogeneity and epistasis analysis based on multi-objective optimization, Bioinformatics, 33 (2017), 2829–2836.
    [43] X. Li, J. Y. Peng, J. W. Niu, et al., A robust and energy efficient authentication protocol for Industrial Internet of Things, IEEE Internet Things J., 5 (2018), 1606–1615.
    [44] J. Wang, J. Y. Cao, R. Simon, et al., An improved ant colony optimization-based approach with mobile sink for wireless sensor networks, J. Supercomput., 74 (2018), 6633–6645.
    [45] J. Wang, Y. Gao, X. Yin, et al., An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks, Wirel. Commun. Mob. Com., 18 (2018), 1–9.
    [46] X. Li, J. W. Niu, M. Bhuiyan, et al., A robust ECC based provable secure authentication protocol with privacy preserving for industrial internet of things, IEEE T. Ind. Inform., 14 (2017), 3599–3609.
  • This article has been cited by:

    1. Yongjun Ren, Fujian Zhu, Pradip Kumar Sharma, Tian Wang, Jin Wang, Osama Alfarraj, Amr Tolba, Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things, 2019, 20, 1424-8220, 207, 10.3390/s20010207
    2. Jiaxing Li, Jigang Wu, Guiyuan Jiang, Thambipillai Srikanthan, Blockchain-based public auditing for big data in cloud storage, 2020, 57, 03064573, 102382, 10.1016/j.ipm.2020.102382
    3. Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh, Simple and scalable blockchain with privacy, 2021, 58, 22142126, 102700, 10.1016/j.jisa.2020.102700
    4. Xiang Chen, A security integration model for private data of intelligent mobile communication based on edge computing, 2020, 162, 01403664, 204, 10.1016/j.comcom.2020.08.026
    5. Yepeng Liu, Yongjun Ren, Chunpeng Ge, Jinyue Xia, Qirun Wang, A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system, 2019, 47, 22142126, 125, 10.1016/j.jisa.2019.05.002
    6. Yehia I. Alzoubi, Valmira H. Osmanaj, Ashraf Jaradat, Ahmad Al‐Ahmad, Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art, 2021, 4, 2475-6725, 10.1002/spy2.145
    7. Yongjun Ren, Fujian Zhu, Jian Qi, Jin Wang, Arun Kumar Sangaiah, Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things, 2019, 9, 2076-3417, 2058, 10.3390/app9102058
    8. Yong Sauk Hau, Jae Min Lee, Jaechan Park, Min Cheol Chang, Attitudes Toward Blockchain Technology in Managing Medical Information: Survey Study, 2019, 21, 1438-8871, e15870, 10.2196/15870
    9. Yongjun Ren, Jian Qi, Yepeng Liu, Jin Wang, Gwang-Jun Kim, Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator, 2021, 21, 1533-5399, 1, 10.1145/3380749
    10. Yongjun Ren, Yan Leng, Fujian Zhu, Jin Wang, Hye-Jin Kim, Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network, 2019, 19, 1424-8220, 2395, 10.3390/s19102395
    11. Pingshui Wang, Qinjuan Ma, Issues of privacy policy conflict in mobile social network, 2020, 16, 1550-1477, 155014772091293, 10.1177/1550147720912939
    12. Sahar Ismail, Rahaf Almayouf, Shaden Chehab, Shatha Alghamdi, Albandari Almutairi, Bshair Alasmari, Rawan Altherwy, 2020, Edge IoT-cloud Framework based on Blockchain, 978-1-7281-5467-1, 1, 10.1109/ICCIS49240.2020.9257647
    13. Chunpeng Ge, Zhe Liu, Liming Fang, A blockchain based decentralized data security mechanism for the Internet of Things, 2020, 141, 07437315, 1, 10.1016/j.jpdc.2020.03.005
    14. Yongjun Ren, Fujian Zhu, Kui Zhu, Pradip Kumar Sharma, Jin Wang, Blockchain-based trust establishment mechanism in the internet of multimedia things, 2020, 1380-7501, 10.1007/s11042-020-09578-y
    15. Xiaonan Li, Xi Cheng, Wenjian Wu, Qinghua Wang, Zhaoyang Tong, Xiaoqing Zhang, Dahai Deng, Yihe Li, Xinbao Gao, An improved wavelet de-noising-based back propagation neural network model to forecast the bioaerosol concentration, 2021, 55, 0278-6826, 352, 10.1080/02786826.2020.1846678
    16. Xiaofang Luo, Wei Wang, Design and Implementation of Decentralized Swarm Intelligence E-Commerce Model Based on Regional Chain and Edge Computing, 2021, 2021, 1099-0526, 1, 10.1155/2021/5595002
    17. Weijian Zhang, Hao Wang, Hao Hua, Qirun Wang, Selfish Mining and Defending Strategies in the Bitcoin, 2022, 34, 1079-8587, 1861, 10.32604/iasc.2022.030274
    18. Cuixiang Wang, Xing Shao, Yifan Meng, Jun Gao, A Physical Layer Network Coding Based Tag Anti-collision Algorithm for RFID System, 2020, 66, 1546-2226, 931, 10.32604/cmc.2020.012267
    19. Hongxia Deng, Chunxiang Hu, Zihao Zhou, Jinxiu Guo, Zhenxuan Zhang, Haifang Li, RMCA-LSA: A Method of Monkey Brain Extraction, 2021, 29, 1079-8587, 387, 10.32604/iasc.2021.016989
    20. Shan Ji, Wei Zhou, Chuan Ma, Dafang Li, Kui Zhu, Liming Fang, Proofs of retrievability with tag outsourcing based on Goppa codes, 2023, 86, 09205489, 103719, 10.1016/j.csi.2022.103719
    21. Alexandru A. Maftei, Alexandru Lavric, Adrian I. Petrariu, Valentin Popa, Massive Data Storage Solution for IoT Devices Using Blockchain Technologies, 2023, 23, 1424-8220, 1570, 10.3390/s23031570
    22. Yiming Liu, Ke Chen, Lanzhen Bian, Lei Ren, Jing Hu, Jinyue Xia, Game-Theory Based Graded Diagnosis Strategies of Craniocerebral Injury, 2021, 29, 1079-8587, 553, 10.32604/iasc.2021.017391
    23. Jin Wang, Jiahao Chen, Yongjun Ren, Pradip Kumar Sharma, Osama Alfarraj, Amr Tolba, Data security storage mechanism based on blockchain industrial Internet of Things, 2022, 164, 03608352, 107903, 10.1016/j.cie.2021.107903
    24. Xiaona Hu, Shan Ji, Hao Hua, Baiqing Zhou, Gang Hu, An Improved Genetic Algorithm for Berth Scheduling at Bulk Terminal, 2022, 43, 0267-6192, 1285, 10.32604/csse.2022.029230
    25. Jin Wang, Chenchen Han, Xiaofeng Yu, Yongjun Ren, R. Simon Sherratt, Distributed Secure Storage Scheme Based on Sharding Blockchain, 2022, 70, 1546-2226, 4485, 10.32604/cmc.2022.020648
    26. Huading Ling, Aiping Zhang, Changchun Yin, Dafang Li, Mengyu Chang, Improve Representation for Cross-Language Clone Detection by Pretrain Using Tree Autoencoder, 2022, 33, 1079-8587, 1561, 10.32604/iasc.2022.027349
    27. Kaspar A. Schindler, Tobias Nef, Maxime O. Baud, Athina Tzovara, Gürkan Yilmaz, Gerd Tinkhauser, Stephan M. Gerber, Oriella Gnarra, Jan D. Warncke, Narayan Schütz, Samuel E. J. Knobel, Markus H. Schmidt, Paul Krack, Flavio Fröhlich, Raphael Sznitman, Simon Rothen, Claudio L. A. Bassetti, NeuroTec Sitem-Insel Bern: Closing the Last Mile in Neurology, 2021, 5, 2514-183X, 13, 10.3390/ctn5020013
    28. Yongjun Ren, Xinyu Liu, Qiang Wu, Ling Wang, Weijian Zhang, Stelvio Cimato, Cryptographic Accumulator and Its Application: A Survey, 2022, 2022, 1939-0122, 1, 10.1155/2022/5429195
    29. P. Renuka, B. Booba, 2022, Chapter 30, 978-981-16-3960-9, 351, 10.1007/978-981-16-3961-6_30
    30. Jun Zhu, Chaosong Yan, Yinglong Ouyang, Yao Chen, Xiaowan Wang, Security Data Sharing of Shipbuilding Information Based on Blockchain, 2022, 33, 1079-8587, 1747, 10.32604/iasc.2022.026934
    31. Zixin Wang, Bin Cao, Chenxi Liu, Congfang Xu, Lei Zhang, Blockchain-based fog radio access networks: Architecture, key technologies, and challenges, 2022, 8, 23528648, 720, 10.1016/j.dcan.2021.12.006
    32. Pengchong Han, Zhouyang Zhang, Shan Ji, Xiaowan Wang, Liang Liu, Yongjun Ren, Access control mechanism for the Internet of Things based on blockchain and inner product encryption, 2023, 74, 22142126, 103446, 10.1016/j.jisa.2023.103446
    33. Min Rao, Yufeng Li, Hongye Liu, Isabel Wang, Yongjun Ren, Influencing Factors Analysis of Rehabilitation for Patients with Spinal Cord Injury, 2022, 34, 1079-8587, 455, 10.32604/iasc.2022.027694
    34. Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss, A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology, 2020, 8, 2169-3536, 33644, 10.1109/ACCESS.2020.2972606
    35. Jothi Prakash Venugopal, Arul Antran Vijay Subramanian, Jegathesh Peatchimuthu, The realm of metaverse: A survey, 2023, 1546-4261, 10.1002/cav.2150
    36. Mingsen Mo, Shan Ji, Xiaowan Wang, Ghulam Mohiuddin, Yongjun Ren, Privacy Data Management Mechanism Based on Blockchain and Federated Learning, 2023, 74, 1546-2226, 37, 10.32604/cmc.2023.028843
    37. Xinyu Liu, Shan Ji, Xiaowan Wang, Liang Liu, Yongjun Ren, Blockchain Data Availability Scheme with Strong Data Privacy Protection, 2023, 14, 2078-2489, 88, 10.3390/info14020088
    38. Dengzhi Liu, Yong Zhang, Dongbao Jia, Qiaosheng Zhang, Xuefeng Zhao, Huan Rong, Toward secure distributed data storage with error locating in blockchain enabled edge computing, 2022, 79, 09205489, 103560, 10.1016/j.csi.2021.103560
    39. Lanlan Ni, Lanzheng Bian, Rugang Lu, Ting Chen, Jinyue Xia, Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward, 2022, 43, 0267-6192, 219, 10.32604/csse.2022.026594
    40. Xiaoli Hao, Xiaojuan Meng, Yueqin Zhang, Jindong Xue, Jinyue Xia, Conveyor Belt Detection Based on Deep Convolution GANs, 2021, 29, 1079-8587, 601, 10.32604/iasc.2021.017963
    41. Wanchun Dou, Bowen Liu, Chuangwei Lin, Xiaokang Wang, Xutong Jiang, Lianyong Qi, Architecture of virtual edge data center with intelligent metadata service of a geo-distributed file system, 2022, 128, 13837621, 102545, 10.1016/j.sysarc.2022.102545
    42. Lihua Zhang, Chunhui Liu, Boping Li, Haodong Fang, Jinguang Gu, A Secure Storage and Deletion Verification Scheme of Microgrid Data Based on Integrating Blockchain into Edge Computing, 2022, 11, 2079-9292, 4033, 10.3390/electronics11234033
    43. Jian Geng, Shaoyuan Yu, Ailin Chen, Hao Wang, Bo Yan, Liang Li, Lei Song, Qirun Wang, Evidence Mechanism of Power Dispatching Instruction Based on Blockchain, 2022, 43, 0267-6192, 559, 10.32604/csse.2022.026948
    44. Tao Li, Qi Qian, Yongjun Ren, Yongzhen Ren, Jinyue Xia, Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing, 2020, 66, 1546-2226, 779, 10.32604/cmc.2020.010424
    45. Sahar A. ElRahman, Ala Saleh Alluhaidan, Blockchain technology and IoT-edge framework for sharing healthcare services, 2021, 25, 1432-7643, 13753, 10.1007/s00500-021-06041-4
    46. Houshyar Honar Pajooh, Mohammed A. Rashid, Fakhrul Alam, Serge Demidenko, IoT Big Data provenance scheme using blockchain on Hadoop ecosystem, 2021, 8, 2196-1115, 10.1186/s40537-021-00505-y
    47. Yehia Ibrahim Alzoubi, Asif Gill, Alok Mishra, A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues, 2022, 11, 2192-113X, 10.1186/s13677-022-00353-y
    48. Jiang Xu, Ling Wang, Xinyu Liu, Xiujuan Feng, Yongjun Ren, Jinyue Xia, Front-end Control Mechanism of Electronic Records, 2021, 39, 0267-6192, 337, 10.32604/csse.2021.015004
    49. Leo Eichhorn, Tanya Shreedhar, Aleksandr Zavodovski, Nitinder Mohan, 2021, Distributed Ledgers for Distributed Edge, 9781450391382, 26, 10.1145/3488663.3493687
    50. Qiang Wu, Liang Xi, Shiren Wang, Shan Ji, Shenqing Wang, Yongjun Ren, Verifiable Delay Function and Its Blockchain-Related Application: A Survey, 2022, 22, 1424-8220, 7524, 10.3390/s22197524
    51. Yongjun Ren, Xinyu Liu, Pradip Kumar Sharma, Osama Alfarraj, Amr Tolba, Shenqing Wang, Jin Wang, Data storage mechanism of industrial IoT based on LRC sharding blockchain, 2023, 13, 2045-2322, 10.1038/s41598-023-29917-x
    52. Jing Hu, Gang Hu, Jiantao Cai, Lipeng Xu, Qirun Wang, Hospital Bed Allocation Strategy Based on Queuing Theory during the COVID-19 Epidemic, 2020, 66, 1546-2226, 793, 10.32604/cmc.2020.011110
    53. Lei Ren, Jing Hu, Mei Li, Ling Zhang, Jinyue Xia, Structured Graded Lung Rehabilitation for Children with Mechanical Ventilation, 2022, 40, 0267-6192, 139, 10.32604/csse.2022.018640
    54. Kamta Nath Mishra, Vandana Bhattacharjee, Shashwat Saket, Shivam Prakash Mishra, Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach, 2022, 1386-7857, 10.1007/s10586-022-03813-x
    55. Jing Hu, Ling Zhang, Jie Li, Qirun Wang, A New Mixed Clustering-based Method to Analyze the Gait of Children with Cerebral Palsy, 2021, 66, 1546-2226, 1551, 10.32604/cmc.2020.011829
    56. Ting Chen, Kai Pu, Lanzhen Bian, Min Rao, Jing Hu, Rugang Lu, Jinyue Xia, Process Optimization Method for Day Ward Based on Bayesian Decision-Tree, 2022, 32, 1079-8587, 513, 10.32604/iasc.2022.022510
    57. Wei Gao, Haixu Xi, Gyun Yeol Park, Context-Aware Service Model of a Mobile Library Based on Internet of Things, 2022, 33, 1079-8587, 1893, 10.32604/iasc.2022.023207
    58. Zhoubao Sun, Xiaodong Zhang, Haoyuan Li Yan Xiao, Haifeng Guo, Recommender Systems Based on Tensor Decomposition, 2020, 66, 1546-2226, 621, 10.32604/cmc.2020.012593
    59. Haixu Xi, Wei Gao, Gyun Yeol Park, Situation Awareness Data Fusion Method Based on Library Events, 2022, 42, 0267-6192, 1047, 10.32604/csse.2022.022051
    60. Antonios Makris, Ioannis Kontopoulos, Evangelos Psomakelis, Stylianos Nektarios Xyalis, Theodoros Theodoropoulos, Konstantinos Tserpes, Performance Analysis of Storage Systems in Edge Computing Infrastructures, 2022, 12, 2076-3417, 8923, 10.3390/app12178923
    61. Xiaoli Hao, Xiaojuan Meng, Yueqin Zhang, JinDong Xue, Jinyue Xia, Conveyor-Belt Detection of Conditional Deep Convolutional Generative Adversarial Network, 2021, 69, 1546-2226, 2671, 10.32604/cmc.2021.016856
    62. Jin Wang, Wei Ou, Osama Alfarraj, Amr Tolba, Gwang-Jun Kim, Yongjun Ren, Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain, 2023, 45, 0267-6192, 1805, 10.32604/csse.2023.029622
    63. Yuqi Fan, Huanyu Wu, Hye-Young Paik, DR-BFT: A consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system, 2021, 124, 0167739X, 33, 10.1016/j.future.2021.04.020
    64. Giacomo Butte, Yady Tatiana Solano-Correa, Maria Valasia Peppa, Diana Marcela Ruíz-Ordóñez, Rachael Maysels, Nasser Tuqan, Xanthe Polaine, Carolina Montoya-Pachongo, Claire Walsh, Thomas Curtis, A Framework for Water Security Data Gathering Strategies, 2022, 14, 2073-4441, 2907, 10.3390/w14182907
    65. Aparna R, Sanjay Raj R, Swapnonil Bandopadhyay, Anu Vikram K, Sonali Pandey, 2021, BlockDrive: A Deduplication framework for Cloud using edge-level blockchain, 978-1-6654-0430-3, 1, 10.1109/ICCICT50803.2021.9510039
    66. He Xue, Dajiang Chen, Ning Zhang, Hong-Ning Dai, Keping Yu, Integration of blockchain and edge computing in internet of things: A survey, 2022, 0167739X, 10.1016/j.future.2022.10.029
    67. Ling Wang, Shan Ji, Zhaokang Wang, Xiaowan Wang, Ghulam Mohiuddin, Yongjun Ren, Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data, 2022, 34, 1079-8587, 221, 10.32604/iasc.2022.027536
    68. Yibin Xu, Yangyu Huang, Segment Blockchain: A Size Reduced Storage Mechanism for Blockchain, 2020, 8, 2169-3536, 17434, 10.1109/ACCESS.2020.2966464
    69. Adeel Ahmed, Saima Abdullah, Muhammad Bukhsh, Israr Ahmad, Zaigham Mushtaq, An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain, 2022, 10, 2169-3536, 11404, 10.1109/ACCESS.2022.3146295
    70. Xiaona Hu, Baiqing Zhou, Jinyue Xia, Yao Chen, Gang Hu, Energy-saving-oriented Berth Scheduling Model at Bulk Terminal, 2022, 33, 1079-8587, 1801, 10.32604/iasc.2022.027034
    71. Dengzhi Liu, Zhimin Li, Chen Wang, Yongjun Ren, Enabling secure mutual authentication and storage checking in cloud-assisted IoT, 2022, 19, 1551-0018, 11034, 10.3934/mbe.2022514
    72. N. Krishnaraj, Kiranmai Bellam, B. Sivakumar, A. Daniel, 2022, Chapter 10, 978-3-030-70500-8, 207, 10.1007/978-3-030-70501-5_10
    73. Xianhui Chen, Design and implementation of decentralized E-commerce model based on edge computing, 2021, 10641246, 1, 10.3233/JIFS-219066
    74. Hao Yan, Yanan Liu, Shuo Qiu, Shengzhou Hu, Weijian Zhang, Jinyue Xia, Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain, 2022, 41, 0267-6192, 1129, 10.32604/csse.2022.022317
    75. Yehia Ibrahim Alzoubi, Ahmad Al-Ahmad, Hasan Kahtan, Blockchain technology as a Fog computing security and privacy solution: An overview, 2022, 182, 01403664, 129, 10.1016/j.comcom.2021.11.005
    76. Baiqing Zhou, Na Li, Duan Lu, Jinyue Xia, Correlation Analysis between Economic Growth and Environmental Quality, 2022, 41, 0267-6192, 127, 10.32604/csse.2022.017750
    77. Jin Wang, Jiahao Chen, Neal Xiong, Osama Alfarraj, Amr Tolba, Yongjun Ren, S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT, 2022, 1533-5399, 10.1145/3511902
    78. Dan Wang, Lanzheng Bian, Xiaoyan Hao, Yiming Liu, Jinyue Xia, Jing Hu, Early Rehabilitation After Craniosynostosis Surgery, 2022, 72, 1546-2226, 3899, 10.32604/cmc.2022.026660
    79. Wei Zhou, Hao Wang, Ghulam Mohiuddin, Dan Chen, Yongjun Ren, Consensus Mechanism of Blockchain Based on PoR with Data Deduplication, 2022, 34, 1079-8587, 1473, 10.32604/iasc.2022.029657
    80. Jin Wang, Wei Ou, Wenhai Wang, R. Simon Sherratt, Yongjun Ren, Xiaofeng Yu, Data Security Storage Mechanism Based on Blockchain Network, 2023, 74, 1546-2226, 4933, 10.32604/cmc.2023.034148
    81. Zhaoyan Wang, In-Young Ko, 2023, Edge-Cloud Collaboration Architecture for Efficient Web-Based Cognitive Services, 978-1-6654-7578-5, 124, 10.1109/BigComp57234.2023.00028
    82. Hongyun Cai, Lijing Gao, Jiahao Wang, Fengyu Li, Reliable incentive mechanism in hierarchical federated learning based on two-way reputation and contract theory, 2024, 159, 0167739X, 533, 10.1016/j.future.2024.05.045
    83. Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Kateryna Kuznetsova, Dzianis Kanonik, Oleksandr Domin, Merkle trees in blockchain: A Study of collision probability and security implications, 2024, 26, 25426605, 101193, 10.1016/j.iot.2024.101193
    84. D. Shivaramakrishna, M. Nagaratna, A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control, 2023, 84, 11100168, 275, 10.1016/j.aej.2023.10.054
    85. Yadong Zhang, Yujuan Zheng, Chen Yin, Chunju Shi, 2024, Application of Secure Data Storage and Transmission in Cloud Computing Based on Blockchain Technology, 9798400709920, 200, 10.1145/3687311.3687348
    86. Imran Khan, Yasar Majib, Rehmat Ullah, Omer Rana, Blockchain Applications for Internet of Things — A Survey, 2024, 27, 25426605, 101254, 10.1016/j.iot.2024.101254
    87. Minyu Teng, Jingxuan Han, Jintao Xie, Jiayao Gao, Jiangfeng Li, Yang Shi, Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage, 2024, 20, 1550-4859, 1, 10.1145/3687127
    88. Amad Alanhdi, László Toka, A Survey on Integrating Edge Computing With AI and Blockchain in Maritime Domain, Aerial Systems, IoT, and Industry 4.0, 2024, 12, 2169-3536, 28684, 10.1109/ACCESS.2024.3367118
    89. Fangpeng Jin, Mi Zou, Xiaoyun Peng, Hua Lei, Yongjun Ren, Deep Learning-Enhanced Internet of Things for Activity Recognition in Post-Stroke Rehabilitation, 2024, 28, 2168-2194, 3851, 10.1109/JBHI.2023.3332735
    90. Haijun Bao, Minghao Yuan, Haitao Deng, Jiang Xu, Yekang Zhao, Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain, 2024, 10, 24058440, e34458, 10.1016/j.heliyon.2024.e34458
    91. Tongrui Zhang, Dat Tien Doan, Jing Kang, Application of building information modeling-blockchain integration in the Architecture, Engineering, and Construction / Facilities Management industry: A review, 2023, 77, 23527102, 107551, 10.1016/j.jobe.2023.107551
    92. Yongjun Ren, Long Chen, Yongmei Bai, Jiale Ye, Yekang Zhao, Blockchain-based cross-domain query integrity verification mechanism for outsourced database, 2025, 92, 09205489, 103926, 10.1016/j.csi.2024.103926
    93. Yekang Zhao, Wangchen Dai, Shiren Wang, Liang Xi, Shenqing Wang, Feng Zhang, A Review of Cuckoo Filters for Privacy Protection and Their Applications, 2023, 12, 2079-9292, 2809, 10.3390/electronics12132809
    94. Jiale Ye, Yongmei Bai, Jiang Xu, Shitao Huang, Zhaoyang Han, Wei Wan, Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments, 2024, 13, 2079-9292, 4167, 10.3390/electronics13214167
    95. Xiaolong Wang, Qianjun Wu, Yuhang Chen, Caijun Zhang, Wei Yang, Kaiqiang Xian, 2024, Generic Storage of Multi-form Data for Power Grid Business System, 9798400709784, 202, 10.1145/3677182.3677218
    96. Yongjun Ren, Zhiying Lv, Neal N. Xiong, Jin Wang, HCNCT: A Cross-chain Interaction Scheme for the Blockchain-based Metaverse, 2024, 20, 1551-6857, 1, 10.1145/3594542
    97. Haitao Deng, Jing Hu, Rohit Sharma, Mingsen Mo, Yongjun Ren, NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory, 2023, 206, 01403664, 1, 10.1016/j.comcom.2023.04.026
    98. Xia Zhang, Haitao Deng, Rui Wu, Jingjing Ren, Yongjun Ren, PQSF: post-quantum secure privacy-preserving federated learning, 2024, 14, 2045-2322, 10.1038/s41598-024-74377-6
    99. Utsa Roy, Nirnay Ghosh, BloAC: A blockchain-based secure access control management for the Internet of Things, 2024, 87, 22142126, 103897, 10.1016/j.jisa.2024.103897
    100. Wenjing Lv, Jue Chen, Songlin Cheng, Xihe Qiu, Dongmei Li, QoS-driven resource allocation in fog radio access network: A VR service perspective, 2024, 21, 1551-0018, 1573, 10.3934/mbe.2024068
    101. Changyu Duan, Rong Jiang, Yi Zhang, Bin Wu, Fengliang Li, Yu Duan, Distributed medical data storage model based on blockchain technology, 2024, 27, 1386-7857, 4757, 10.1007/s10586-023-04207-3
    102. M. Nalini, R. Thilagavathy, K. Bhargavi, K. Thinakaran, Optimizing Storage Efficiency Through Pipelining and Parallelization for Enhanced Data Deduplication, 2024, 33, 0218-1266, 10.1142/S0218126624502591
    103. Mingjia Han, Xinyi Yang, Huachang Su, Yekang Zhao, Ding Huang, Yongjun Ren, Spatio-Temporal Big Data Collaborative Storage Mechanism Based on Incremental Aggregation Subvector Commitment in On-Chain and Off-Chain Systems, 2024, 13, 2220-9964, 280, 10.3390/ijgi13080280
    104. Ruikui Ma, Qiuqian Wang, Xiangxi Bu, Xuebin Chen, Real-Time Detection of DDoS Attacks Based on Random Forest in SDN, 2023, 13, 2076-3417, 7872, 10.3390/app13137872
    105. Jungwon Seo, Sooyong Park, SBAC: Substitution cipher access control based on blockchain for protecting personal data in metaverse, 2024, 151, 0167739X, 85, 10.1016/j.future.2023.09.022
    106. Amerah Alabrah, A Novel Neural Network Architecture Using Automated Correlated Feature Layer to Detect Android Malware Applications, 2023, 11, 2227-7390, 4242, 10.3390/math11204242
    107. Yizhe Zhou, Xianwei Zhu, Ailin Chen, Zhouyang Zhang, Pengchong Han, Feng Zhang, Zhaoyang Han, Jiang Xu, Bo Lan, Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption, 2024, 17, 1936-6442, 1021, 10.1007/s12083-024-01622-0
    108. Xingchen Liu, Shaohui Zhang, Haiping Huang, Reza Malekian, A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage, 2024, 17, 1936-6442, 985, 10.1007/s12083-024-01635-9
    109. Yehia Ibrahim Alzoubi, Ali Aljaafreh, Blockchain-Fog Computing Integration Applications: A Systematic Review, 2023, 23, 1314-4081, 3, 10.2478/cait-2023-0001
    110. Haixu Xi, Feng Zhang, Yintong Wang, Transformer Machine Translation Model Incorporating Word Alignment Structure, 2024, 70, 0098-3063, 1010, 10.1109/TCE.2023.3332878
    111. R.P. Puneeth, G Parthasarathy, A cross-chain-based approach for secure data sharing and interoperability in electronic health records using blockchain technology, 2024, 120, 00457906, 109676, 10.1016/j.compeleceng.2024.109676
    112. JiaJun Liu, Jie Zhang, JieWu Leng, Combining permissioned blockchain and Bayesian best-worst method for transparent supplier selection in supply chain management, 2024, 67, 1674-7321, 2579, 10.1007/s11431-024-2677-0
    113. Wanchun Dou, Xiaolong Xu, Shui Yu, 2023, Chapter 3, 978-981-99-5731-6, 39, 10.1007/978-981-99-5732-3_3
    114. Qiang Shu, Yan Li, Wei Gao, Emergency treatment mechanism of laboratory safety accidents in university based on IoT and context aware computing, 2023, 9, 24058440, e19406, 10.1016/j.heliyon.2023.e19406
    115. Ruyan Liu, Xiaofeng Yu, Yuan Yuan, Yongjun Ren, BTDSI: A blockchain-based trusted data storage mechanism for Industry 5.0, 2023, 35, 13191578, 101674, 10.1016/j.jksuci.2023.101674
    116. Xiaowan Wang, Huiyin Xie, Shan Ji, Liang Liu, Ding Huang, Blockchain-based fake news traceability and verification mechanism, 2023, 9, 24058440, e17084, 10.1016/j.heliyon.2023.e17084
    117. Jia Ni, Guowei Fang, Yekang Zhao, Jingjing Ren, Long Chen, Yongjun Ren, Distributed Group Key Management Based on Blockchain, 2024, 13, 2079-9292, 2216, 10.3390/electronics13112216
    118. Linchen Liu, Ruyan Liu, Zhiying Lv, Ding Huang, Xing Liu, Dual blockchain-based data sharing mechanism with privacy protection for medical internet of things, 2024, 10, 24058440, e23575, 10.1016/j.heliyon.2023.e23575
    119. Lili Cheng, Zhiying Lv, Osama Alfarraj, Amr Tolba, Xiaofeng Yu, Yongjun Ren, Secure cross-chain interaction solution in multi-blockchain environment, 2024, 10, 24058440, e28861, 10.1016/j.heliyon.2024.e28861
    120. Yongjing Zhang, Zhouyang Zhang, Shan Ji, Shenqing Wang, Shitao Huang, Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning, 2024, 13, 2079-9292, 848, 10.3390/electronics13050848
    121. Hongwu Qin, Chao Xue, Xiuqin Ma, Ying Si, Zhenxin Jiang, A storage mechanism of data access record on consortium chain based on master-slave blocks, 2024, 10, 24058440, e32088, 10.1016/j.heliyon.2024.e32088
    122. Ran Wang, Cheng Xu, Xiaotong Zhang, Toward Materials Genome Big-Data: A Blockchain-Based Secure Storage and Efficient Retrieval Method, 2024, 35, 1045-9219, 1630, 10.1109/TPDS.2024.3426275
    123. Aiting Yao, Gang Li, Xuejun Li, Frank Jiang, Jia Xu, Xiao Liu, Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions, 2023, 19, 25900056, 100293, 10.1016/j.array.2023.100293
    124. Hanqi Sun, Wanquan Zhu, Ziyu Sun, Mingsheng Cao, Wenbin Liu, FMDL: Federated Mutual Distillation Learning for Defending Backdoor Attacks, 2023, 12, 2079-9292, 4838, 10.3390/electronics12234838
    125. Lin Ge, Tao Jiang, Hongquan Wei, Selection of node with editing rights and privacy protection mechanisms based on dual-blockchain, 2023, 35, 13191578, 101849, 10.1016/j.jksuci.2023.101849
    126. Ying Huang, Smart home system using blockchain technology in green lighting environment in rural areas, 2024, 10, 24058440, e26620, 10.1016/j.heliyon.2024.e26620
    127. Chen Zhonghua, S. B. Goyal, Anand Singh Rajawat, Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing, 2024, 80, 0920-8542, 1396, 10.1007/s11227-023-05517-4
    128. Kefei Lu, Zhongyuan Qin, Liquan Chen, 2023, LN-PCA: Differential Privacy Protection of Medical Data Based on Principal Component Analysis Adding Laplace Noise, 9781450399029, 697, 10.1145/3594315.3594393
    129. Honghui Fan, Jiahe Huang, Xianzhen Huang, Hongjin Zhu, Huachang Su, BI-RRT*: An improved path planning algorithm for secure and trustworthy mobile robots systems, 2024, 10, 24058440, e26403, 10.1016/j.heliyon.2024.e26403
    130. Haotian Luo, Niansong Mei, Chong Du, EMR sharing system with lightweight searchable encryption and rights management, 2024, 27, 1386-7857, 6341, 10.1007/s10586-024-04294-w
    131. Ailin Chen, Shaoyuan Yu, Xinyi Yang, Ding Huang, Yongjun Ren, IoT data security in outsourced databases: A survey of verifiable database, 2024, 10, 24058440, e28117, 10.1016/j.heliyon.2024.e28117
    132. Shaoyuan Yu, Jing Yang, Jia Ni, Chunyi Chen, Tao Yu, Ailin Chen, Jian Geng, Hua Zhong, Weihua Weng, Tao Wei, Secure traceability mechanism of green electricity based on smart contracts and provenance model, 2024, 10, 24058440, e32091, 10.1016/j.heliyon.2024.e32091
    133. Yongjing Zhang, Guannan Li, Wangchen Dai, Chengxin Hong, Jin Qian, Zhaoyang Han, IoT-based generalized multi-granulation sequential three-way decisions, 2023, 209, 01403664, 402, 10.1016/j.comcom.2023.07.031
    134. Xiaofeng Yu, Ruyan Liu, Lewis Nkenyereye, Zhiming Wang, Yongjun Ren, ACRS-Raft: A Raft Consensus Protocol for Adaptive Data Maintenance in the Metaverse Based on Cauchy Reed–Solomon Codes, 2024, 70, 0098-3063, 3792, 10.1109/TCE.2024.3373435
    135. Yangyang Guo, Hongye Liu, Yaojin Sun, Yongjun Ren, Virtual human pose estimation in a fire education system for children with autism spectrum disorders, 2024, 30, 0942-4962, 10.1007/s00530-024-01274-3
    136. Jiachen Shen, Yekang Zhao, Shitao Huang, Yongjun Ren, Secure and Flexible Privacy-Preserving Federated Learning Based on Multi-Key Fully Homomorphic Encryption, 2024, 13, 2079-9292, 4478, 10.3390/electronics13224478
    137. Guowei Fang, Yi Sun, Mutiq Almutiq, Wei Zhou, Yekang Zhao, Yongjun Ren, Distributed Medical Data Storage Mechanism Based on Proof of Retrievability and Vector Commitment for Metaverse Services, 2024, 28, 2168-2194, 6298, 10.1109/JBHI.2023.3272021
    138. Meenakshi Kandpal, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, Rabindra Barik, Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach, 2024, 37, 0353-3670, 317, 10.2298/FUEE2402317K
    139. Ziyuan Zhou, Long Chen, Yekang Zhao, Xinyi Yang, Zhaoyang Han, Zheng He, Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration, 2024, 24, 1424-8220, 7487, 10.3390/s24237487
    140. Nomula Ashok, T. Judgi, 2024, Advanced Techniques in Dynamic Key Management and Multilayered Security for Securing Cloud Infrastructures Using Key-Aggregate Encryption Method, 979-8-3315-1809-7, 1290, 10.1109/ICICNIS64247.2024.10823242
    141. Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han, Wei Wan, Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment, 2025, 25, 1424-8220, 550, 10.3390/s25020550
    142. Yongjun Ren, Zhiming Wang, Pradip Kumar Sharma, Fayez Alqahtani, Amr Tolba, Jin Wang, Zero Trust Networks: Evolution and Application from Concept to Practice, 2025, 82, 1546-2226, 1593, 10.32604/cmc.2025.059170
    143. Qianqi Sun, Fenhua Bai, An Encode-and CRT-Based Scalability Scheme for Optimizing Transmission in Blockchain, 2024, 139, 1526-1506, 1733, 10.32604/cmes.2023.044558
    144. Jin Wang, Guoshu Huang, R. Simon Sherratt, Ding Huang, Jia Ni, Data Secure Storage Mechanism for IIoT Based on Blockchain, 2024, 78, 1546-2226, 4029, 10.32604/cmc.2024.047468
    145. Nothile C. Masango, Jeffrey O. Agushaka, Mercy C. Amaefule, Olutosin Taiwo, Peiying Zhang, Absalom E. Ezugwu, Kashif Saleem, Aseel Smerat, Laith Abualigah, Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism, 2025, 2025, 1687-1499, 10.1186/s13638-025-02439-y
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(8477) PDF downloads(1121) Cited by(145)

Figures and Tables

Figures(7)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog