Blockchain Security in Edge Computing: Use Cases, Challenges, and Solutions

Blockchain Security in Edge Computing: Use Cases, Challenges, and Solutions

Copyright: © 2024 |Pages: 30
DOI: 10.4018/979-8-3693-2081-5.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the past decade, edge computing and blockchain technology have been used in many applications with rapid growth. The chapter explores the intersection of blockchain technology and edge computing and investigates the security issues and solutions in this emerging domain. Edge computing refers to “the decentralized processing and storage of data at the network edge, closer to the data sources and end-users. It offers reduced latency, improved data privacy, and enhanced real-time decision-making capabilities.” However, it also introduces new security challenges due to the distributed and resource-constrained nature of edge devices. The integration of blockchain technology with edge computing holds promise in addressing these security issues. Blockchain can provide a decentralized and tamper-resistant ledger for recording and verifying transactions, ensuring data integrity, and establishing trust among edge devices and stakeholders. This chapter explores several use cases where blockchain and edge computing can synergistically enhance security.
Chapter Preview
Top

1. Introduction

1.1 Background of Blockchain Security in Edge Computing

Blockchain Security in Edge Computing is an emerging field that explores the integration of blockchain technology with edge computing environments to enhance security (Smith et al., 2021). Edge computing refers to the decentralized processing and storage of data at the network edge, closer to the data sources and end-users. It enables real-time data processing, reduced latency, and improved performance by using edge devices such as sensors, gateways, and edge servers. However, the distributed and resource-constrained nature of edge devices introduces unique security challenges. Note that Blockchain technology provides a decentralized and tamper-resistant ledger for recording and verifying transactions. It offers features such as immutability, transparency, and consensus mechanisms that enhance the security and trustworthiness of data and transactions.

The integration of blockchain with edge computing has the potential to address security issues in edge environments. By using blockchain, edge computing systems can achieve secure data storage and sharing, provenance and traceability, secure transactions, and decentralized governance (Zhang, Lee, & Wang, 2020). The background of Blockchain Security in Edge Computing research involves exploring the use cases, challenges, and solutions related to the integration of blockchain and edge computing. Researchers and practitioners are investigating how blockchain can enhance security in various edge computing applications such as supply chain management, IoT networks, smart cities, healthcare systems, and more. The aim is to understand the security implications of combining blockchain and edge computing, identify the challenges specific to this integration, and propose solutions to address these challenges. This includes considering the scalability of blockchain in edge environments, developing lightweight consensus algorithms suitable for resource-constrained devices, ensuring data privacy and confidentiality, and establishing interoperability standards for heterogeneous edge ecosystems. The background research in Blockchain Security in Edge Computing aims to lay the foundation for developing secure and trustworthy edge computing systems by using the benefits of blockchain technology. By addressing the security issues in this emerging field, researchers and practitioners aim to foster the adoption of blockchain-enabled edge computing and unlock its potential in various industries.

Complete Chapter List

Search this Book:
Reset