A blockchain‐enabled security management framework for mobile edge computing
Jafar A. Alzubi,Ashish Singh,Tareq Mahmod Alzubi,Omar A. Alzub
DOI: https://doi.org/10.1002/nem.2240
2023-05-21
International Journal of Network Management
Abstract:A blockchain‐enabled security management framework for mobile edge computing (MEC) environments, which guarantees secure data storage in MEC environment using blockchain's security, features such as tamper‐resistance, immutability, transparency, traceability, and distributed ledger. Furthermore, it provides legitimate access with low latency and high throughput. Mobile edge computing (MEC) integrates mobile and edge computing technologies to provide efficient computing services with low latency. It includes several Internet of Things (IoT) and edge devices that process the user data at the network's edge. The architectural characteristic of MEC supports many internet‐based services, which attract more number of users, including attackers. The safety and privacy of the MEC environment, especially user information is a significant concern. A lightweight accessing and sharing protocol is required because edge devices are resource constraints. This paper addresses this issue by proposing a blockchain‐enabled security management framework for MEC environments. This approach provides another level of security and includes blockchain security features like temper resistance, immutable, transparent, traceable, and distributed ledger in the MEC environment. The framework guarantees secure data storage in the MEC environment. The contributions of this paper are twofold: (1) We propose a blockchain‐enabled security management framework for MEC environments that address the security and privacy concerns, and (2) we demonstrate through simulations that the framework has high performance and is suitable for resource‐constrained MEC devices. In addition, a smart contract‐based access and sharing mechanism is proposed. Our research uses a combination of theoretical analysis and simulation experiments to demonstrate that the proposed framework offers high security, low latency, legitimate access, high throughput, and low operations cost.
computer science, information systems,telecommunications