Huang et al., 2022 - Google Patents
Elastic resource allocation against imbalanced transaction assignments in sharding-based permissioned blockchainsHuang et al., 2022
- Document ID
- 8137184712816597332
- Author
- Huang H
- Yue Z
- Peng X
- He L
- Chen W
- Dai H
- Zheng Z
- Guo S
- Publication year
- Publication venue
- IEEE Transactions on Parallel and Distributed Systems
External Links
Snippet
This article studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment strategy could be malicious such that the network shards may …
- 238000002347 injection 0 abstract description 53
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Huang et al. | Elastic resource allocation against imbalanced transaction assignments in sharding-based permissioned blockchains | |
| Yang et al. | Delay-aware virtual network function placement and routing in edge clouds | |
| Rehman et al. | Cloud based secure service providing for IoTs using blockchain | |
| Liu et al. | Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates | |
| Gai et al. | Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing | |
| Alam et al. | Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment | |
| US11017388B2 (en) | Cryptographically assured zero-knowledge cloud service for composable atomic transactions | |
| Xu et al. | X-shard: Optimistic cross-shard transaction processing for sharding-based blockchains | |
| Feldman et al. | The proportional-share allocation market for computational resources | |
| US11017387B2 (en) | Cryptographically assured zero-knowledge cloud services for elemental transactions | |
| Liu et al. | A decentralized cloud firewall framework with resources provisioning cost optimization | |
| Li et al. | Scalable blockchain storage mechanism based on two-layer structure and improved distributed consensus | |
| Al-Bassam et al. | Airtnt: Fair exchange payment for outsourced secure enclave computations | |
| Elsedimy et al. | Toward enhancing the energy efficiency and minimizing the SLA violations in cloud data centers | |
| Ren et al. | Joint optimization of VNF placement and flow scheduling in mobile core network | |
| Yue et al. | Dynamic placement of virtual machines with both deterministic and stochastic demands for green cloud computing | |
| Cui et al. | A secure and decentralized DLaaS platform for edge resource scheduling against adversarial attacks | |
| Ludwig et al. | Optimizing multi‐tier application performance with interference and affinity‐aware placement algorithms | |
| Dwiardhika et al. | Optimal construction of service function chains based on security level for improving network security | |
| Huang et al. | A secure cost‐effective migration of enterprise applications to the cloud | |
| Blockchains | Elastic resource allocation against imbalanced transaction assignments in sharding-based | |
| Chen et al. | Cost-efficient request scheduling and resource provisioning in multiclouds for internet of things | |
| Liu et al. | OverlapShard: Overlap-based sharding mechanism | |
| CN116703601B (en) | Data processing method, device, equipment and storage medium based on block chain network | |
| Ngenzi | Applying mathematical models in cloud computing: A survey |