Cargando…
Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach
It is difficult to manage massive amounts of data in an overlying environment with a single server. Therefore, it is necessary to comprehend the security provisions for erratic data in a dynamic environment. The authors are concerned about the security risk of vulnerable data in a Mobile Edge based...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9713169/ https://www.ncbi.nlm.nih.gov/pubmed/36471703 http://dx.doi.org/10.1007/s10586-022-03813-x |
_version_ | 1784841956720902144 |
---|---|
author | Mishra, Kamta Nath Bhattacharjee, Vandana Saket, Shashwat Mishra, Shivam Prakash |
author_facet | Mishra, Kamta Nath Bhattacharjee, Vandana Saket, Shashwat Mishra, Shivam Prakash |
author_sort | Mishra, Kamta Nath |
collection | PubMed |
description | It is difficult to manage massive amounts of data in an overlying environment with a single server. Therefore, it is necessary to comprehend the security provisions for erratic data in a dynamic environment. The authors are concerned about the security risk of vulnerable data in a Mobile Edge based distributive environment. As a result, edge computing appears to be an excellent perspective in which training can be done in an Edge-based environment. The combination of Edge computing and consensus approach of Blockchain in conjunction with machine learning techniques can further improve data security, mitigate the possibility of exposed data, and it reduces the risk of a data breach. As a result, the concept of federated learning provides a path for training the shared data. A dataset was collected that contained several vulnerable, exposed, recovered, and secured data and data security was precepted under the surveillance of two-factor authentication. This paper discusses the evolution of data and security flaws and their corresponding solutions in smart edge computing devices. The proposed model incorporates data security using consensus approach of Blockchain and machine learning techniques that include several classifiers and optimization techniques. Further, the authors applied the proposed algorithms in an edge computing environment by distributing several batches of data to different clients. As a result, the client privacy was maintained by using Blockchain servers. Furthermore, the authors segregated the client data into batches that were trained using the federated learning technique. The results obtained in this paper demonstrate the implementation of a Blockchain-based training model in an edge-based computing environment. |
format | Online Article Text |
id | pubmed-9713169 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-97131692022-12-01 Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach Mishra, Kamta Nath Bhattacharjee, Vandana Saket, Shashwat Mishra, Shivam Prakash Cluster Comput Article It is difficult to manage massive amounts of data in an overlying environment with a single server. Therefore, it is necessary to comprehend the security provisions for erratic data in a dynamic environment. The authors are concerned about the security risk of vulnerable data in a Mobile Edge based distributive environment. As a result, edge computing appears to be an excellent perspective in which training can be done in an Edge-based environment. The combination of Edge computing and consensus approach of Blockchain in conjunction with machine learning techniques can further improve data security, mitigate the possibility of exposed data, and it reduces the risk of a data breach. As a result, the concept of federated learning provides a path for training the shared data. A dataset was collected that contained several vulnerable, exposed, recovered, and secured data and data security was precepted under the surveillance of two-factor authentication. This paper discusses the evolution of data and security flaws and their corresponding solutions in smart edge computing devices. The proposed model incorporates data security using consensus approach of Blockchain and machine learning techniques that include several classifiers and optimization techniques. Further, the authors applied the proposed algorithms in an edge computing environment by distributing several batches of data to different clients. As a result, the client privacy was maintained by using Blockchain servers. Furthermore, the authors segregated the client data into batches that were trained using the federated learning technique. The results obtained in this paper demonstrate the implementation of a Blockchain-based training model in an edge-based computing environment. Springer US 2022-11-30 /pmc/articles/PMC9713169/ /pubmed/36471703 http://dx.doi.org/10.1007/s10586-022-03813-x Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Mishra, Kamta Nath Bhattacharjee, Vandana Saket, Shashwat Mishra, Shivam Prakash Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach |
title | Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach |
title_full | Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach |
title_fullStr | Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach |
title_full_unstemmed | Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach |
title_short | Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach |
title_sort | security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9713169/ https://www.ncbi.nlm.nih.gov/pubmed/36471703 http://dx.doi.org/10.1007/s10586-022-03813-x |
work_keys_str_mv | AT mishrakamtanath securityprovisionsinsmartedgecomputingdevicesusingblockchainandmachinelearningalgorithmsanovelapproach AT bhattacharjeevandana securityprovisionsinsmartedgecomputingdevicesusingblockchainandmachinelearningalgorithmsanovelapproach AT saketshashwat securityprovisionsinsmartedgecomputingdevicesusingblockchainandmachinelearningalgorithmsanovelapproach AT mishrashivamprakash securityprovisionsinsmartedgecomputingdevicesusingblockchainandmachinelearningalgorithmsanovelapproach |