skip to main content
10.1145/3460179.3460185acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciitConference Proceedingsconference-collections
research-article

Scalable Peer-to-Peer Fog Computing Integrated to a Fast-Searching Distributed Blockchain System

Published:10 August 2021Publication History

ABSTRACT

Internet of Things (IoT) is becoming a promising area to support communication of all type of devices. Blockchain aids to ensure higher security in this field, but the increase in ubiquitous connectivity leads to increase load and hence it requires a perfect search for the nodes. This paper addresses the issue by the design of a three tier P2p fog-IoT architecture using distributed blockchain. The tier-1 employs an authenticator responsible to authenticate IoT nodes with identity, IP address and physical unclonable function (PUF). To balance IoT nodes request, super peers are dynamically selected from multi-criteria ranking based optimal points (MC-RBOP). Further the requests are forwarded to blockchain present in tier-3. In tier-3 the Master node performs storage and searching. Due to the possibility of redundant data storage, Jaro-Winkler measures a similarity in the data before storing it. An Adaptive Chord with fuzzy neural (AC-FNN) is incorporated to search the lightweight U-QUARK algorithm-based hash key-values in the directory. The design of fog-IoT with new chord algorithm is implemented in network simulator-3 and the results are evaluated in terms of latency, response time, blockchain size and network usage.

Skip Supplemental Material Section

Supplemental Material

References

  1. Kun Ma, Antoine Bagula, Clement Nyirenda, Olasupo Ajayi, ‘An IoT-Based Fog Computing Model’, Sensors, MDPI, Vol. 19, No. 12, 2019.Google ScholarGoogle Scholar
  2. Ammar Awad Mutlag, Mohd Khanapi Abd Ghani, N. Aunkumar, Mazin Abed Mohammed, Othman Mohd, ‘Enabling technologies for fog computing in healthcare IoT systems’, Future Generation Computer Systems, Vol. 90, pp. 62 – 78, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  3. Quang Duy La, Mao V. Ngo, Thinh Quang Dinh, Tony Q.S. Quek, Hyundong Shin, ‘Enbaling intelligence in fog computing to achieve energy and latency reduction’, Digital Communications and Networks, 2019.Google ScholarGoogle Scholar
  4. Rodrigo A. C. da Silva, Nelson L. S. da Fonseca, ‘On the Location of Fog Nodes in Fog-Cloud Infrastructures’, Sensors, MDPI, Vol. 19, No. 11, 2019.Google ScholarGoogle Scholar
  5. Pinchen Cui, Ujjwal Guin, Anthony Skjellum, David Umphress, ‘Blockchain in IoT: Current Trends, Challenges, and Future Roadmap’, Journal of Hardware and Systems Security, pp. 338 – 364, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bacem Mbarek, Nafaâ Jabeur, Tomás Pitner, Ansar-Ul-Haque Yasar, ‘MBS: Multilevel Blockchain System for IoT’,Personal and Ubiquitous Computing, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  7. Göran Pulkkis, Jonny Karlsson, Magnus Westerlund, ‘Blockchain-Based Security Solutions for IoT Systems’, Wiley Online Library, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  8. Peng Zhang, Jules White, Douglas C.Schmidt, Gunther Lenz, S.Trent Rosenbloom, ‘FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data’, Computational And Structural Biotechnology Journal, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  9. Naveed Islam, Yasir Faheem, Ikram Ud Din, Muhammad Talha, Mohsen Guizani, Mudassir Khalil, ‘A blockchain-based fog computing framework for activity recognition as an application to e-healthcare services’, Future Generation computer Systems, Elsevier, Vol. 100, pp. 569 – 578, 2019.Google ScholarGoogle Scholar
  10. Su-Hwan Jang, Jo Guejong, Jongpil Jeong, Bae Sangmin, ‘Fog Computing Architecture Based Blockchain for Industrial IoT’, International Conference on Computational Science, pp. 593 – 606, 2019.Google ScholarGoogle Scholar
  11. Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap, ‘LightChain: A DHT-based Blockchain for Resource Constrained Environments’, Distributed, Parallel, and Cluster Computing, arXiv.org, 2019.Google ScholarGoogle Scholar
  12. Sandi Rahmadika, Kyung-Hyune Rhee, ‘Blockchain technology for providing an architecture model of decentralized personal health information’, International Journal of Engineering Business Management, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  13. Antonio Tenorio-Fornés, Samer Hassan, Samer Hassan, Juan Pavón, ‘Open Peer-to-Peer Systems over Blockchain and IPFS: an Agent Oriented Framework’, 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp. 19 – 24, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ollen Chen, ‘Hybrid blockchain and pseudonymous authentication for secure and trusted IoT networks’, Vol. 15, No. 5, ACM SIGBED, Vol. 15, No. 5, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Spyros Voulgaris, Nikos Fotiou, Vasilios A. Siris, George C.Polyzos, Mikael Jaatinen, Yannis Oikonomidis, ‘Blockcahin Technology for Intelligent Environments’, Future Internet, Vol. 11, No. 10, 2019.Google ScholarGoogle Scholar
  16. Srikanta Pradhan, Somanath Tripathy, Sukumar Nandi, ‘Blockchain based Security Framework for P2P Filesharing system’, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2019.Google ScholarGoogle Scholar
  17. Jollen Chen, ‘Flowchain: A Distributed Ledger Designed for Peer-to-Per IoT Networks and Real-time Data Transactions’, Computer Science, 2017.Google ScholarGoogle Scholar
  18. Mazin Debe, Khaled Salah, Muhammad Habib Ur Rahman, Davor Svetinovic, ‘Blockchain-Based Decentralized Reverse Bidding in Fog Computing’, IEEE Access, Vol. 8, pp. 81686 – 81697, 2020.Google ScholarGoogle Scholar
  19. Joong-Lyul Lee, Stephen C Kerns, Sangjin Hong, ‘A Secure IoT-Fog-Cloud Framework Using Blockchain Based on DAT for Mobile IoT’, IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2019.Google ScholarGoogle Scholar
  20. Michael HerbertZiegler, Marcel Groβmann, Udo R. Krieger, ‘Integration of Fog Computing and Blockchain Technology Using the Plasma Framework’, IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019.Google ScholarGoogle Scholar
  21. Juah C Song, Mevlut A Demir, John J Prevost, Paul Rad, ‘Blockchain Design for Trusted Decentralized IoT Networks’, 13th Annual Conference on System of Systems Engineering (SoSE), 2018.Google ScholarGoogle Scholar
  22. Olivier Debauche, Saïd Mahimoudi, Pierre Manneback, Abdessamad Assila, ‘Fog IoT for Health: A new Architecture for Patients and Elderly Monitoring’, Procedia Computer Science, Elsevier, Vol. 160, pp. 289 – 297, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Kai Lei, Maoyu Du, Jiyue Huang, Tong Jin, ‘Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing’, IEEE Transactions on Services Computing, Vol. 13, No. 2, pp. 252 – 262, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  24. Mazin Debe, Khaled Salah, Muhammad Habib Ur Rehman, Davor Svetinovic, ‘IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain’, IEEE Access, Vol. 7, pp. 178082 – 178093, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  25. Bingqing Shen, Jingzhi Guo, Yilong Yang, ‘MedChain: Efficient Healthcare Data Sharing via Blockchain’, Applied Sciences, MDPI, Vol. 9, No. 6, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  26. Umair Khalid, Muhammad Asim, Thar Baker, Patrick C. K. Hung, Muhammad Adnan Tariq, Laura Rafferty, ‘A decentralized lightweight blockchain-based authentication mechanism for IoT systems’, Cluster Computing, Springer, 2020.Google ScholarGoogle Scholar
  27. Sandi Rahmadika, Kyung-Hyune Rhee, ‘Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks’, Wireless Communications and Mobile Computing, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Jean-Philippe Aumasson, Luca Henzen, Willi Meier, Maria Naya-Plasencia, ‘QUARK: A Lightweight Hash’, Journal of Cryptology, pp. 313 -339, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICIIT '21: Proceedings of the 2021 6th International Conference on Intelligent Information Technology
    February 2021
    106 pages
    ISBN:9781450388948
    DOI:10.1145/3460179

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 August 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format