Anum Nawaz, Tuan Anh Nguyen Gia, J. P. Queralta, Tomi Westerlund
{"title":"边缘人工智能和区块链用于隐私关键和数据敏感应用","authors":"Anum Nawaz, Tuan Anh Nguyen Gia, J. P. Queralta, Tomi Westerlund","doi":"10.23919/ICMU48249.2019.9006635","DOIUrl":null,"url":null,"abstract":"The edge and fog computing paradigms enable more responsive and smarter systems without relying on cloud servers for data processing and storage. This reduces network load as well as latency. Nonetheless, the addition of new layers in the network architecture increases the number of security vulnerabilities. In privacy-critical systems, the appearance of new vulnerabilities is more significant. To cope with this issue, we propose and implement an Ethereum Blockchain based architecture with edge artificial intelligence to analyze data at the edge of the network and keep track of the parties that access the results of the analysis, which are stored in distributed databases.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":"{\"title\":\"Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications\",\"authors\":\"Anum Nawaz, Tuan Anh Nguyen Gia, J. P. Queralta, Tomi Westerlund\",\"doi\":\"10.23919/ICMU48249.2019.9006635\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The edge and fog computing paradigms enable more responsive and smarter systems without relying on cloud servers for data processing and storage. This reduces network load as well as latency. Nonetheless, the addition of new layers in the network architecture increases the number of security vulnerabilities. In privacy-critical systems, the appearance of new vulnerabilities is more significant. To cope with this issue, we propose and implement an Ethereum Blockchain based architecture with edge artificial intelligence to analyze data at the edge of the network and keep track of the parties that access the results of the analysis, which are stored in distributed databases.\",\"PeriodicalId\":348402,\"journal\":{\"name\":\"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"29\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ICMU48249.2019.9006635\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICMU48249.2019.9006635","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
The edge and fog computing paradigms enable more responsive and smarter systems without relying on cloud servers for data processing and storage. This reduces network load as well as latency. Nonetheless, the addition of new layers in the network architecture increases the number of security vulnerabilities. In privacy-critical systems, the appearance of new vulnerabilities is more significant. To cope with this issue, we propose and implement an Ethereum Blockchain based architecture with edge artificial intelligence to analyze data at the edge of the network and keep track of the parties that access the results of the analysis, which are stored in distributed databases.