Font Size: a A A

File Integrity And Deployment Strategies Based On Blockchain In Edge Computing

Posted on:2022-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y YangFull Text:PDF
GTID:2518306575966969Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of artificial intelligence and big data technology,the amount of data generated in the Internet is increasing,so is the amount of data that needs to be processed and stored.For more timely and convenient calculation or storage,the use of edge nodes to process data has gradually become the mainstream.Due to the uneven security performance of edge nodes,the security of data is not guaranteed,the file holder is no longer a user,and the integrity of the file is most likely to be threatened.Currently,many studies use different algorithms(such as operation log classification,Merkle tree validation,etc.)to verify integrity,but there is still the possibility that the evidence to verify integrity will be tampered with.If integrity is verified by third-party auditing,an increase in the number of members participating in the test also increases the risk of untrustworthy integrity tests.Therefore,it is necessary to build a system which can effectively protect the integrity test evidence so that it can not be tampered with and cannot be forged.Block chains are a kind of chain data structure that collects digital signatures,hash functions and consensus mechanisms.Block chains are used to build a integrity verification system to protect the integrity of data and verify the evidence.However,the current mainstream consensus mechanism of block chains has the following shortcomings:(1)In the process of workload certification,nodes account for a large number of meaningless mathematical problems,wasting a lot of computing resources and energy;(2)Equity certificates will lead to Matthew effect,which may lead to serious polarization in the block chain and affect the balance of the system;(3)The proxy rights and interests prove excessive dependence on participant voting,if participants are not active,it will affect the normal operation of the system.None of the above mechanisms can fully adapt to the integrity checking system in edge computing.In order to fully apply block chains to integrity checking in edge computing and solve the shortcomings of existing block chains technologies,this thesis mainly studies the following two points:(1)file integrity checking strategies based on block chains,the consensus mechanism between nodes is studied;(2)On the basis of the research content(1),the dynamic deployment strategy of files is studied.The research results obtained in this thesis are as follows:1.To solve the high energy consumption and long time consuming problem of traditional block chain consensus mechanism,this thesis presents a green computing consensus mechanism.Edge nodes generate file deployment scenarios,and then nodes vote on the scenario.The node with the most votes becomes the bookkeeper to add a new block.Reduce the amount of calculation in the work certificate,utilize the computing resources to calculate the deployment location of the file,realize the reuse of resources,and deploy the results as the actual deployment strategy of the current file.The validity of the strategy is verified by comparative experiments.2.To solve the problem of deployment between multi-file and multi-node in consensus mechanism,this thesis presents a Crow algorithm based on probability transfer for file deployment.The deployment strategy considers both read and write efficiency and load balancing of nodes,aiming to improve user experience while reducing node pressure.Experiments show that the file deployment strategy proposed in this thesis can further improve the user experience and load balance between nodes.3.In view of the problem of visualization system,this thesis designs and implements a file visualization management system based on edge computing,and explicitly verifies the research results of file integrity,which provides a new practical solution for the file management strategy of edge computing.In summary,the results of this study provide a new research idea for file integrity check and file deployment strategies in edge computing,and lay a certain theoretical basis for the application and promotion of edge computing.
Keywords/Search Tags:integrity verification, consensus mechanism, file deployment, visualization system
PDF Full Text Request
Related items