[go: up one dir, main page]

Huang et al., 2022 - Google Patents

Elastic resource allocation against imbalanced transaction assignments in sharding-based permissioned blockchains

Huang et al., 2022

Document ID
8137184712816597332
Author
Huang H
Yue Z
Peng X
He L
Chen W
Dai H
Zheng Z
Guo S
Publication year
Publication venue
IEEE Transactions on Parallel and Distributed Systems

External Links

Snippet

This article studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment strategy could be malicious such that the network shards may …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Huang et al. Elastic resource allocation against imbalanced transaction assignments in sharding-based permissioned blockchains
Yang et al. Delay-aware virtual network function placement and routing in edge clouds
Rehman et al. Cloud based secure service providing for IoTs using blockchain
Liu et al. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
Gai et al. Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing
Alam et al. Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment
US11017388B2 (en) Cryptographically assured zero-knowledge cloud service for composable atomic transactions
Xu et al. X-shard: Optimistic cross-shard transaction processing for sharding-based blockchains
Feldman et al. The proportional-share allocation market for computational resources
US11017387B2 (en) Cryptographically assured zero-knowledge cloud services for elemental transactions
Liu et al. A decentralized cloud firewall framework with resources provisioning cost optimization
Li et al. Scalable blockchain storage mechanism based on two-layer structure and improved distributed consensus
Al-Bassam et al. Airtnt: Fair exchange payment for outsourced secure enclave computations
Elsedimy et al. Toward enhancing the energy efficiency and minimizing the SLA violations in cloud data centers
Ren et al. Joint optimization of VNF placement and flow scheduling in mobile core network
Yue et al. Dynamic placement of virtual machines with both deterministic and stochastic demands for green cloud computing
Cui et al. A secure and decentralized DLaaS platform for edge resource scheduling against adversarial attacks
Ludwig et al. Optimizing multi‐tier application performance with interference and affinity‐aware placement algorithms
Dwiardhika et al. Optimal construction of service function chains based on security level for improving network security
Huang et al. A secure cost‐effective migration of enterprise applications to the cloud
Blockchains Elastic resource allocation against imbalanced transaction assignments in sharding-based
Chen et al. Cost-efficient request scheduling and resource provisioning in multiclouds for internet of things
Liu et al. OverlapShard: Overlap-based sharding mechanism
CN116703601B (en) Data processing method, device, equipment and storage medium based on block chain network
Ngenzi Applying mathematical models in cloud computing: A survey