On the feasibility of byzantine agreement to secure fog/edge data management

dc.contributor.author Houssam Ahmad Yactin en
dc.contributor.author Shoker,A en
dc.contributor.other 6717 en
dc.date.accessioned 2021-03-19T11:42:42Z
dc.date.available 2021-03-19T11:42:42Z
dc.date.issued 2021 en
dc.description.abstract Fog/Edge computing improves the latency and security of data by keeping storage and computation close to the data source. Nevertheless, this raises other security challenges against malicious, a.k.a, Byzantine, attacks that can exploit the isolation of nodes, or when access to distributed data is required in untrusted environments. In this work, we study the feasibility of deploying Byzantine Agreement protocols to improve the security of fog/edge systems in untrusted environments. In particular, we explore existing Byzantine Agreement protocols, heavily developed in the Blockchain area, emphasizing the Consistency, Availability, and Partition-Tolerance tradeoffs in a geo-replicated system. Our work identifies and discusses three different approaches that follow the Strong Consistency, Eventual Consistency, and Strong Eventual Consistency models. Our conclusions show that Byzantine Agreement protocols are still immature to be used by fog/edge computing in untrusted environment due to their high finality latency; however, they are promising candidates that encourage further research in this direction. © 2021, Springer Nature Switzerland AG. en
dc.identifier.uri http://repositorio.inesctec.pt/handle/123456789/12088
dc.identifier.uri http://dx.doi.org/10.1007/978-3-030-57328-7_5 en
dc.language eng en
dc.rights info:eu-repo/semantics/openAccess en
dc.title On the feasibility of byzantine agreement to secure fog/edge data management en
dc.type Publication en
dc.type bookPart en
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
P-00T-HQ3.pdf
Size:
2.14 MB
Format:
Adobe Portable Document Format
Description: