Nothing Special   »   [go: up one dir, main page]

CN113079159B - Edge computing network system based on block chain - Google Patents

Edge computing network system based on block chain Download PDF

Info

Publication number
CN113079159B
CN113079159B CN202110356016.6A CN202110356016A CN113079159B CN 113079159 B CN113079159 B CN 113079159B CN 202110356016 A CN202110356016 A CN 202110356016A CN 113079159 B CN113079159 B CN 113079159B
Authority
CN
China
Prior art keywords
edge
terminal
data
computing
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110356016.6A
Other languages
Chinese (zh)
Other versions
CN113079159A (en
Inventor
张锦南
鲁昌其
张永久
郭腾
康健
程刚
袁学光
颜鑫
张霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202110356016.6A priority Critical patent/CN113079159B/en
Publication of CN113079159A publication Critical patent/CN113079159A/en
Application granted granted Critical
Publication of CN113079159B publication Critical patent/CN113079159B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明提出一种基于区块链的边缘计算网络系统,包括:终端、边缘代理层、边缘服务层及云计算中心;边缘代理层,用于通过私有区块链中已认证终端的身份信息判断接入的终端是否为已认证终端;若判断结果为是,则执行终端的数据发送与接收;边缘服务层,用于通过公有区块链中的身份认证功能对边缘代理层进行认证,若认证通过,则执行终端的请求。本方案提出了基于双层区块链的边缘计算网络系统。终端在边缘代理层根据私有区块链的管理下执行其功能而不能在网络上直接与云计算中心通信。终端通过边缘代理层完成数据传输和接收服务。边缘服务层基于公有区块链对边缘代理层进行验证,验证通过后由边缘服务器发起并执行终端设备的请求。

Figure 202110356016

The present invention proposes a blockchain-based edge computing network system, including: a terminal, an edge agent layer, an edge service layer and a cloud computing center; the edge agent layer is used to judge the identity information of the authenticated terminal in the private blockchain Whether the connected terminal is an authenticated terminal; if the judgment result is yes, the data transmission and reception of the terminal is performed; the edge service layer is used to authenticate the edge proxy layer through the identity authentication function in the public blockchain. If passed, the request of the terminal is executed. This scheme proposes an edge computing network system based on a two-layer blockchain. The terminal performs its functions under the management of the private blockchain at the edge agent layer and cannot directly communicate with the cloud computing center on the network. The terminal completes data transmission and reception services through the edge proxy layer. The edge service layer verifies the edge proxy layer based on the public blockchain. After the verification is passed, the edge server initiates and executes the request of the terminal device.

Figure 202110356016

Description

一种基于区块链的边缘计算网络系统A blockchain-based edge computing network system

技术领域technical field

本发明涉及边缘计算以及区块链技术领域,特别涉及一种基于区块链的边缘计算网络架构。The invention relates to the technical fields of edge computing and blockchain, and in particular, to an edge computing network architecture based on blockchain.

背景技术Background technique

近些年来,物联网由于其强大的互联互通特性,在现实世界中扮演着重要角色,促进和推动了众多新兴业务在日常生活中的广泛使用。然而,随着物联网接入设备数量的增加,同时生成和待处理的实时数据量也呈指数级增长。这些数据都需要传输到云服务器中心进行计算和存储服务,对云平台的性能和网络带宽提出了不小的挑战,且数据集中在云平台进行处理也带来很多风险,需要传递到云平台的海量数据流对整个网络施加了巨大压力。同时,由于单点故障是不可避免的隐患,由此中心服务器也很难保证网络安全;为了解决上述问题,人们引入了边缘计算。In recent years, the Internet of Things has played an important role in the real world due to its strong interconnectivity, promoting and promoting the widespread use of many emerging businesses in daily life. However, as the number of IoT-connected devices increases, so does the amount of real-time data being generated and processed at the same time. All these data need to be transmitted to the cloud server center for computing and storage services, which poses a lot of challenges to the performance and network bandwidth of the cloud platform, and the centralized processing of data in the cloud platform also brings many risks, which need to be transmitted to the cloud platform. The massive data flow puts enormous pressure on the entire network. At the same time, since a single point of failure is an unavoidable hidden danger, it is difficult for the central server to ensure network security; in order to solve the above problems, edge computing is introduced.

边缘计算是一种新的计算范例,可以将应用程序的前置处理,隐私数据存储以及实时数据处理和分析从云服务器中心转移到网络的边缘服务器,从而保留云计算的核心优势,并将实时控制和敏感数据存储到边缘服务器,但是边缘计算同样具有安全和隐私的问题,例如在边缘计算体系结构中的身份验证,入侵检测,访问控制等容易被破解导致无法保证安全,从而影响到了边缘计算的使用。Edge computing is a new computing paradigm that can move the pre-processing of applications, private data storage, and real-time data processing and analysis from cloud server centers to the network's edge servers, thereby retaining the core advantages of cloud computing and integrating real-time Control and sensitive data are stored in edge servers, but edge computing also has security and privacy issues, such as authentication, intrusion detection, access control, etc. in the edge computing architecture, which are easily cracked and cannot guarantee security, thus affecting edge computing. usage of.

由此,目前需要一种方法来解决边缘计算的安全问题。Therefore, there is currently a need for a method to solve the security problem of edge computing.

发明内容SUMMARY OF THE INVENTION

有鉴于此,本发明提出了一种基于区块链的边缘计算网络架构,提高了边缘计算的安全性。In view of this, the present invention proposes an edge computing network architecture based on blockchain, which improves the security of edge computing.

具体的,本发明提出了以下具体的实施例:Specifically, the present invention proposes the following specific embodiments:

本发明实施例提出了一种基于区块链的边缘计算网络架构,包括:终端、设有私有区块链的边缘代理层、设有公有区块链的边缘服务层及云计算中心;其中,所述终端通过所述边缘代理层连接所述边缘服务层;所述边缘服务层连接所述云计算中心;所述边缘代理层,用于通过所述私有区块链中已认证终端的身份信息判断接入的终端是否为已认证终端;若判断结果为是,则执行所述终端的数据发送与接收;所述边缘服务层,用于通过所述公有区块链中的身份认证功能对所述边缘代理层进行认证,若认证通过,则执行所述终端的请求。The embodiment of the present invention proposes a blockchain-based edge computing network architecture, including: a terminal, an edge agent layer with a private blockchain, an edge service layer with a public blockchain, and a cloud computing center; wherein, The terminal is connected to the edge service layer through the edge proxy layer; the edge service layer is connected to the cloud computing center; the edge proxy layer is used to pass the identity information of the authenticated terminal in the private blockchain Judging whether the accessed terminal is an authenticated terminal; if the judgment result is yes, execute data transmission and reception of the terminal; the edge service layer is used to authenticate the terminal through the identity authentication function in the public blockchain. The edge proxy layer performs authentication, and if the authentication is passed, the request of the terminal is executed.

在一个具体的实施例中,所述终端包括用于感知外部环境的传感器和/或将命令转换为物理动作的执行器。In a specific embodiment, the terminal includes sensors for sensing the external environment and/or actuators for converting commands into physical actions.

在一个具体的实施例中,所述边缘代理层由多个代理节点组成;所述代理节点以无线或有线的方式与所述终端连接;所述代理节点提供应用程序的前端交互界面,以便用户设置身份验证凭据、访问后端程序、传达服务请求、接收服务结果及管理所述终端;所述代理节点用于根据业务量和承受能力来控制资源请求;所述代理节点还用于对接收的业务数据进行过滤并以转换为通用格式;所述代理节点还用于在大规模数据处理,边缘代理节点将数据进行转发到私有区块链网络中的其他计算实例。In a specific embodiment, the edge proxy layer is composed of a plurality of proxy nodes; the proxy nodes are connected with the terminal in a wireless or wired manner; Set authentication credentials, access back-end programs, communicate service requests, receive service results, and manage the terminal; the proxy node is used to control resource requests according to the traffic volume and affordability; the proxy node is also used to The business data is filtered and converted into a common format; the proxy node is also used for large-scale data processing, and the edge proxy node forwards the data to other computing instances in the private blockchain network.

在一个具体的实施例中,所述代理节点中设置有代理组件;所述代理组件包括:函数映射模块、设备注册模块、区块链认证模块、高速通道;其中,所述函数映射模块用于获取所述边缘服务器上各应用的信息和地址,管理所述边缘服务器上不同应用的映射信息,将应用信息和应用数据传输到所述边缘服务器的任务队列;所述设备注册模块用于对针对所述终端进行注册;所述区块链认证模块用于实现所述边缘服务器上的应用与所述终端之间的双向认证;所述高速通道用于连接所述云计算中心。In a specific embodiment, a proxy component is set in the proxy node; the proxy component includes: a function mapping module, a device registration module, a blockchain authentication module, and a high-speed channel; wherein, the function mapping module is used for Obtain the information and addresses of each application on the edge server, manage the mapping information of different applications on the edge server, and transmit the application information and application data to the task queue of the edge server; the device registration module is used for The terminal is registered; the blockchain authentication module is used to implement two-way authentication between the application on the edge server and the terminal; the high-speed channel is used to connect the cloud computing center.

在一个具体的实施例中,所述边缘服务层由多个边缘服务节点组成;所述边缘服务节点分为通用计算节点与存储库节点;所述通用计算节点需要通过智能合约进行访问;所述通用计算节点使用向量时钟实现同步;在执行命令时,所述通用计算节点以一对一的方式与关联的代理节点进行交互所述通用计算节点一次最多执行一个应用程序;所述存储库节点提供用于即时访问和分析历史数据的接口,所述存储库节点以日志结构化的方式管理所有数据。In a specific embodiment, the edge service layer is composed of multiple edge service nodes; the edge service nodes are divided into general computing nodes and repository nodes; the general computing nodes need to be accessed through smart contracts; the General purpose computing nodes use vector clocks to achieve synchronization; when executing commands, the general purpose computing nodes interact one-to-one with the associated agent nodes; the general purpose computing nodes execute at most one application at a time; the repository nodes provide An interface for instant access and analysis of historical data, the repository node manages all data in a log-structured manner.

在一个具体的实施例中,所述通用计算节点中存储区块链信息,所述区块链信息包括数据的索引信息;所述存储库节点用于存储索引信息对应数据。In a specific embodiment, the general computing node stores block chain information, and the block chain information includes index information of data; and the repository node is used to store data corresponding to the index information.

在一个具体的实施例中,所述通用计算节点中设置有计算组件,所述计算组件包括:任务队列模块、监视单元、应用执行器、安全控制模块;其中,所述任务队列模块中包括多个队列的集合,用于在不同队列之间调度任务;监视单元,用于监视计算机资源的忙/闲状态;还用于当检测到资源负载超过预定阈值或发生不确定故障时,进入紧急状态;还用于当计算机资源不足或任务队列溢出时,将任务知悉的上下文与数据源进行答辩,生成交易请求发送给所述公有区块链中的智能合约;所述应用执行器用于执行任务;所述安全控制模块用于保障所述应用执行器的数据安全。In a specific embodiment, a computing component is provided in the general computing node, and the computing component includes: a task queue module, a monitoring unit, an application executor, and a security control module; wherein, the task queue module includes multiple A collection of queues for scheduling tasks among different queues; a monitoring unit for monitoring the free/busy status of computer resources; and for entering an emergency state when it is detected that the resource load exceeds a predetermined threshold or an indeterminate failure occurs ; is also used to defend the context of the task and the data source when the computer resources are insufficient or the task queue overflows, generate a transaction request and send it to the smart contract in the public blockchain; the application executor is used to execute the task; The security control module is used to ensure data security of the application executor.

在一个具体的实施例中,所述存储库节点中设置有存储模块,所述存储模块包括:认证中心、镜像目录模块、数据库、高速缓冲区、镜像文件区、身份信息区、云扩展器;其中,所述认证中心用于存储初始化是设置的通用计算节点的认证凭证;还用于对所述数据库中的数据进行加密和解密;还用于定期更新自身在云计算中心的镜像;所述镜像目录模块,用于存储镜像文件的信息,还用于连接通用计算节点上的应用执行器;所述数据库,用于存储所述终端、所述应用执行器以及所述云扩展器的数据;所述高速缓冲区,用于存储频率高于预设值得数据;所述镜像文件区,用于存储应用程序的镜像文件;所述身份信息区,用于获取认证中心的验证结果,且与所述云扩展器进行同步关联;所述云扩展器,用于扩展应用程序规范,传输安全属性和交换数据。In a specific embodiment, a storage module is provided in the storage repository node, and the storage module includes: an authentication center, an image directory module, a database, a high-speed buffer, an image file area, an identity information area, and a cloud extender; Wherein, the authentication center is used to store the authentication credentials of the general computing node whose initialization is set; it is also used to encrypt and decrypt the data in the database; it is also used to regularly update its own image in the cloud computing center; the The image directory module is used to store the information of the image file, and is also used to connect the application executor on the general computing node; the database is used to store the data of the terminal, the application executor and the cloud extender; The high-speed buffer is used to store data with a frequency higher than the preset value; the image file area is used to store the image file of the application; the identity information area is used to obtain the verification result of the certification center, and is used for The cloud extender performs synchronization and association; the cloud extender is used to extend application specifications, transmit security attributes and exchange data.

在一个具体的实施例中,所述云计算中心用于在所述边缘服务层过载或服务要求容忍延迟时,处理使所述边缘服务层过载的数据或所述服务。In a specific embodiment, the cloud computing center is configured to process the data or the service that overloads the edge service layer when the edge service layer is overloaded or the service requires a tolerant delay.

在一个具体的实施例中,所述私有区块链中还存储有所述终端的请求记录和指令记录,以使所述终端所有的操作都可被溯源。In a specific embodiment, the private blockchain also stores request records and instruction records of the terminal, so that all operations of the terminal can be traced back to the source.

与现有技术相比,本方案具有以下效果:Compared with the prior art, this solution has the following effects:

本方案提出了基于双层区块链的边缘计算网络架构。两层区块链分别由边缘代理层和边缘服务层维护,终端在边缘代理层根据私有区块链的管理下执行其功能而不能在网络上直接与云计算中心通信。终端通过边缘代理层完成数据传输和接收服务。边缘服务层基于公有区块链对边缘代理层进行验证,验证通过后由边缘服务器发起并执行终端设备的请求。This scheme proposes an edge computing network architecture based on a two-layer blockchain. The two-layer blockchain is maintained by the edge proxy layer and the edge service layer respectively. The terminal performs its functions under the management of the private blockchain in the edge proxy layer and cannot directly communicate with the cloud computing center on the network. The terminal completes data transmission and reception services through the edge proxy layer. The edge service layer verifies the edge proxy layer based on the public blockchain. After the verification is passed, the edge server initiates and executes the request of the terminal device.

附图说明Description of drawings

为了更清楚地说明本发明实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本发明的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。In order to illustrate the technical solutions of the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings used in the embodiments. It should be understood that the following drawings only show some embodiments of the present invention, and therefore do not It should be regarded as a limitation of the scope, and for those of ordinary skill in the art, other related drawings can also be obtained according to these drawings without any creative effort.

图1为本发明实施例提出的一种基于区块链的边缘计算网络架构的示意图;1 is a schematic diagram of a blockchain-based edge computing network architecture proposed by an embodiment of the present invention;

图2为本发明实施例提出的一种基于区块链的边缘计算网络架构的硬件框架示意图;2 is a schematic diagram of a hardware framework of a blockchain-based edge computing network architecture proposed by an embodiment of the present invention;

图3为本发明实施例提出的一种基于区块链的边缘计算网络架构的功能示意图;3 is a functional schematic diagram of a blockchain-based edge computing network architecture proposed in an embodiment of the present invention;

图4为本发明实施例提出的一种基于区块链的边缘计算网络架构的系统序列示意图。FIG. 4 is a schematic diagram of a system sequence of a blockchain-based edge computing network architecture proposed in an embodiment of the present invention.

具体实施方式Detailed ways

在下文中,将更全面地描述本公开的各种实施例。本公开可具有各种实施例,并且可在其中做出调整和改变。Hereinafter, various embodiments of the present disclosure will be described more fully. The present disclosure is capable of various embodiments, and adaptations and changes may be made therein.

实施例1Example 1

本发明实施例1公开了一种基于区块链的边缘计算网络架构,如图1所示,包括:终端、设有私有区块链的边缘代理层、设有公有区块链的边缘服务层及云计算中心;其中,所述终端通过所述边缘代理层连接所述边缘服务层;所述边缘服务层连接所述云计算中心;Embodiment 1 of the present invention discloses a blockchain-based edge computing network architecture, as shown in FIG. 1 , including: a terminal, an edge agent layer with a private blockchain, and an edge service layer with a public blockchain and a cloud computing center; wherein, the terminal is connected to the edge service layer through the edge proxy layer; the edge service layer is connected to the cloud computing center;

所述边缘代理层,用于通过所述私有区块链中已认证终端的身份信息判断接入的终端是否为已认证终端;若判断结果为是,则执行所述终端的数据发送与接收;The edge proxy layer is used to judge whether the accessed terminal is an authenticated terminal according to the identity information of the authenticated terminal in the private blockchain; if the judgment result is yes, execute data transmission and reception of the terminal;

所述边缘服务层,用于通过所述公有区块链中的身份认证功能对所述边缘代理层进行认证,若认证通过,则执行所述终端的请求。The edge service layer is used to authenticate the edge proxy layer through the identity authentication function in the public blockchain, and execute the request of the terminal if the authentication is passed.

具体的,所述私有区块链中还存储有所述终端的请求记录和指令记录,以使所述终端所有的操作都可被溯源。Specifically, the private blockchain also stores request records and instruction records of the terminal, so that all operations of the terminal can be traced back to the source.

以此,如图1所示,物联网环境的复杂性之一反映在设备的多样性上。不同设备所属的应用场景决定其执行功能的简单或复杂,从而导致设备性能的差异,考虑到这种情况,为了便于管理,我们可以将物联网设备大致分为三种类型:边缘服务器,边缘代理设备和物联网终端设备。With this, as shown in Figure 1, one of the complexities of the IoT environment is reflected in the diversity of devices. The application scenarios to which different devices belong determine the simplicity or complexity of their execution functions, resulting in differences in device performance. Considering this situation, for ease of management, we can roughly divide IoT devices into three types: edge servers, edge agents devices and IoT end devices.

考虑到当前集中式物联网的架构中,所有终端设备及其产生的数据都通过云计算中心来监管,海量的数据流对整个网络施加了巨大压力。同时,由于单点故障是不可避免的隐患,所以云计算中心的服务器也很难保证网络安全。本方案提出的架构旨在通过边缘计算显着减轻云计算中心的压力,在数据源附近使用性能出色的边缘节点处理数据是该架构的中心思想之一。对于边缘计算模式下的物联网具有高度的分布式特性,传统集中式安全风险控制难以适用于当前环境。区块链构建的可信分布式账本为边缘计算提供了更加透明和可控的安全保证。同时,边缘计算在边缘侧的算力配置还可以保证区块链运行时需要的计算资源。Considering that in the current centralized IoT architecture, all terminal devices and the data they generate are supervised by cloud computing centers, the massive data flow puts enormous pressure on the entire network. At the same time, since a single point of failure is an unavoidable hidden danger, it is difficult for the servers in the cloud computing center to ensure network security. The architecture proposed in this scheme aims to significantly reduce the pressure on cloud computing centers through edge computing. Using edge nodes with excellent performance to process data near the data source is one of the central ideas of the architecture. The Internet of Things in the edge computing mode is highly distributed, and traditional centralized security risk control is difficult to apply to the current environment. The trusted distributed ledger built by the blockchain provides a more transparent and controllable security guarantee for edge computing. At the same time, the computing power configuration of edge computing on the edge side can also ensure the computing resources required for the blockchain to run.

在方案中,提出了基于双层区块链的边缘计算网络架构。两层区块链分别由边缘服务器(多个边缘服务器组成边缘服务层)和边缘代理设备(多个边缘代理设备组成边缘代理层)维护,终端在边缘代理层的管理下执行其功能而不能在网络上直接与云中心通信。终端根据实际位置和通信状况选择区域内的边缘代理设备,通过边缘代理设备完成数据传输和接收服务。边缘服务器根据接收到的数据包解析并构建(包括分析和标识)数据。验证后,详细数据将记录在边缘服务器的存储库节点中,边缘代理设备只存储数组摘要。同样,最终由边缘服务器发起并执行终端设备的请求。In the scheme, an edge computing network architecture based on two-layer blockchain is proposed. The two-layer blockchain is maintained by edge servers (multiple edge servers form the edge service layer) and edge proxy devices (multiple edge proxy devices form the edge proxy layer). Terminals perform their functions under the management of the edge proxy layer and cannot Communicate directly with the cloud center on the network. The terminal selects an edge proxy device in the area according to the actual location and communication conditions, and completes data transmission and reception services through the edge proxy device. The edge server parses and constructs (including analyzing and identifying) the data from the received packets. After verification, the detailed data will be recorded in the repository node of the edge server, and the edge proxy device will only store the array summary. Likewise, the request of the terminal device is ultimately initiated and executed by the edge server.

如图1所示,从底层往上分别是终端设备层,边缘代理层,边缘服务层和云计算中心,其中,As shown in Figure 1, from the bottom to the top are the terminal device layer, the edge agent layer, the edge service layer and the cloud computing center, among which,

1.终端设备层:该层由大量资源受限的传感类设备组成,他们的通信能力和计算能力有限,无法单独收发指令,需要借助边缘代理设备完成业务。1. Terminal device layer: This layer is composed of a large number of resource-constrained sensing devices. Their communication capabilities and computing capabilities are limited, and they cannot send and receive instructions independently. They need to use edge proxy devices to complete services.

2.边缘代理层:该层由一定区域内的多个边缘代理设备组成,每个代理设备就近管理一批终端设备,为终端设备提供身份认证,业务请求发送,指令接收等服务。为了保护终端设备的安全性,在代理设备间维护一条私有链。私有区块链用来保存终端设备的身份信息,请求记录和指令记录等信息。因此,终端设备在发起请求时首先要在私有区块链上进行身份验证,获取操作权限,之后才能发起请求。这样一来可以防止终端设备应身份信息被盗而导致的安全隐患,同时终端设备所有的操作都可溯源。2. Edge proxy layer: This layer consists of multiple edge proxy devices in a certain area. Each proxy device manages a group of terminal devices nearby, and provides services such as identity authentication, service request sending, and instruction receiving for terminal devices. To protect the security of end devices, a private chain is maintained between proxy devices. The private blockchain is used to save the identity information of the terminal device, request records and instruction records and other information. Therefore, when a terminal device initiates a request, it must first perform identity verification on the private blockchain and obtain operation permissions before initiating a request. In this way, security risks caused by identity information theft of the terminal device can be prevented, and all operations of the terminal device can be traced back to the source.

3.边缘服务层:该层由计算和存储性能都较为优越的服务器设备组成,在这一层中将传统的服务器划分成了专用性更强的通用计算服务器和存储服务器。通用计算服务器具有较高的算力,同时负责管理一组边缘代理设备,并且作为这组代理设备间私有区块链的控制节点运行。通用计算服务器受理边缘设备的业务请求的同时管理私有链的运行。多个通用计算服务器间也维护着一条公有链,公有链存在的意义是保护边缘服务层的数据安全,同时构建一个区块链网络让多个边缘服务器互联互通。存储服务器是专注于存储功能的服务器,它的运算能力不如通用计算服务器,但是有更加富足的存储空间和高速读写通道。通用计算服务器中存储的区块链信息只是数据的索引值,而真正数据的存放地点在存储服务器中。为了保证安全性,在读取存储服务器上的数据时需要执行区块链上智能合约所编写的身份认证功能,拿到合法的身份信息才能操作数据库。3. Edge service layer: This layer is composed of server devices with superior computing and storage performance. In this layer, traditional servers are divided into general-purpose computing servers and storage servers that are more specialized. The general computing server has high computing power, is responsible for managing a group of edge proxy devices, and operates as the control node of the private blockchain between the set of proxy devices. The general-purpose computing server manages the operation of the private chain while accepting service requests from edge devices. A public chain is also maintained between multiple general-purpose computing servers. The significance of the existence of the public chain is to protect the data security of the edge service layer, and to build a blockchain network to interconnect multiple edge servers. A storage server is a server that focuses on storage functions. Its computing power is not as good as that of a general-purpose computing server, but it has more abundant storage space and high-speed read and write channels. The blockchain information stored in the general computing server is only the index value of the data, and the real data is stored in the storage server. In order to ensure security, the identity authentication function written by the smart contract on the blockchain needs to be executed when reading the data on the storage server, and the database can be operated only after obtaining legal identity information.

4.云计算中心:该数据中心为传统的云服务器,拥有强大的计算能力,能完成如人工智能,大数据等数据密集型高算力服务。终端数据通过本架构的层层处理,到达云计算中心时已经高度精炼,在处理时不用担心数据冗余和数据安全等问题,极大提高云计算中心的效率。4. Cloud computing center: The data center is a traditional cloud server with powerful computing power, which can complete data-intensive and high computing power services such as artificial intelligence and big data. The terminal data is processed layer by layer through this architecture, and it is highly refined when it reaches the cloud computing center. There is no need to worry about data redundancy and data security during processing, which greatly improves the efficiency of the cloud computing center.

以此,本方案提出了基于双层区块链的边缘计算网络架构。两层区块链分别由边缘代理层和边缘服务层维护,终端在边缘代理层根据私有区块链的管理下执行其功能而不能在网络上直接与云计算中心通信。终端通过边缘代理层完成数据传输和接收服务。边缘服务层基于公有区块链对边缘代理层进行验证,验证通过后由边缘服务器发起并执行终端设备的请求。In this way, this scheme proposes an edge computing network architecture based on a two-layer blockchain. The two-layer blockchain is maintained by the edge proxy layer and the edge service layer respectively. The terminal performs its functions under the management of the private blockchain in the edge proxy layer and cannot directly communicate with the cloud computing center on the network. The terminal completes data transmission and reception services through the edge proxy layer. The edge service layer verifies the edge proxy layer based on the public blockchain. After the verification is passed, the edge server initiates and executes the request of the terminal device.

实施例2Example 2

本发明实施例2还提出了一种基于区块链的边缘计算网络架构,在实施例1的基础上,如图2所示,所述终端包括用于感知外部环境的传感器和/或将命令转换为物理动作的执行器。Embodiment 2 of the present invention also proposes an edge computing network architecture based on blockchain. On the basis of Embodiment 1, as shown in FIG. 2 , the terminal includes sensors for sensing the external environment and/or commands An executor that translates to a physical action.

终端:终端分为两类:负责感知外部环境的传感器和将命令转换为物理动作的执行器。通常,物联网终端受到各种资源的限制,仅充当数据链条两端的生产者或消费者。在某些情况下,物联网设备终端的计算能力有限,无法对原始数据进行预处理。本专利的架构允许物联网终端通过无线或有线通信协议(例如Zigbee,蓝牙和NFC)与附近的边缘代理节点连接。物联网终端感知业务的频率可以根据系统上下文进行调整,终端产生数据的格式因设备而异。Terminals: Terminals fall into two categories: sensors that sense the external environment and actuators that translate commands into physical actions. Usually, IoT terminals are limited by various resources and only act as producers or consumers at both ends of the data chain. In some cases, the computing power of IoT device terminals is limited, and the raw data cannot be preprocessed. The architecture of this patent allows IoT endpoints to connect with nearby edge proxy nodes via wireless or wired communication protocols such as Zigbee, Bluetooth and NFC. The frequency at which IoT terminals perceive services can be adjusted according to the system context, and the format of data generated by the terminal varies from device to device.

所述边缘代理层由多个代理节点组成;所述代理节点以无线或有线的方式与所述终端连接;所述代理节点提供应用程序的前端交互界面,以便用户设置身份验证凭据、访问后端程序、传达服务请求、接收服务结果及管理所述终端;所述代理节点用于根据业务量和承受能力来控制资源请求;所述代理节点还用于对接收的业务数据进行过滤并以转换为通用格式;所述代理节点还用于在大规模数据处理,边缘代理节点将数据进行转发到私有区块链网络中的其他计算实例。The edge proxy layer is composed of a plurality of proxy nodes; the proxy nodes are connected with the terminal in a wireless or wired manner; the proxy nodes provide the front-end interactive interface of the application, so that the user can set authentication credentials and access the back-end Program, communicate service requests, receive service results and manage the terminal; the proxy node is used to control resource requests according to the traffic volume and affordability; the proxy node is also used to filter the received service data and convert it into General format; the proxy node is also used for large-scale data processing, and the edge proxy node forwards the data to other computing instances in the private blockchain network.

代理节点:在边缘计算中,代理节点是分布式计算的入口。代理节点协助物联网终端配置集成环境,以便在代理节点上安装和执行相应的应用程序。访问代理节点时,代理节点会提供应用程序的前端交互界面,以便用户设置身份验证凭据、访问后端程序、传达服务期望、接收服务结果、管理终端。代理节点会根据其业务量和承受能力来控制资源请求。此外,代理节点会对接收的业务数据进行过滤并以转换为通用格式。代理节点还汇总了从智能系统的不同来源接收到的数据。对于大规模数据处理,代理节点将数据转发到私有区块链网络中的其他计算实例。代理节点通过CoAP或SNMP与可访问的边缘计算节点保持快速且动态的通信。Proxy node: In edge computing, the proxy node is the entrance to distributed computing. The agent node assists the IoT terminal in configuring the integrated environment to install and execute the corresponding application on the agent node. When accessing a proxy node, the proxy node provides the front-end interactive interface of the application for users to set authentication credentials, access back-end programs, communicate service expectations, receive service results, and manage terminals. Proxy nodes control resource requests according to their traffic volume and affordability. In addition, the proxy node filters the received business data and converts it into a common format. The agent node also aggregates data received from different sources of the intelligent system. For large-scale data processing, proxy nodes forward data to other computing instances in the private blockchain network. Agent nodes maintain fast and dynamic communication with accessible edge computing nodes via CoAP or SNMP.

所述边缘服务层由多个边缘服务节点组成;所述边缘服务节点分为通用计算节点与存储库节点;所述通用计算节点需要通过智能合约进行访问;所述通用计算节点使用向量时钟实现同步;在执行命令时,所述通用计算节点以一对一的方式与关联的代理节点进行交互所述通用计算节点一次最多执行一个应用程序;所述存储库节点提供用于即时访问和分析历史数据的接口,所述存储库节点以日志结构化的方式管理所有数据。The edge service layer is composed of a plurality of edge service nodes; the edge service nodes are divided into general computing nodes and repository nodes; the general computing nodes need to be accessed through smart contracts; the general computing nodes use vector clocks to achieve synchronization When executing a command, the general computing node interacts with the associated proxy node in a one-to-one manner. The general computing node executes at most one application at a time; the repository node provides instant access and analysis of historical data. The repository node manages all data in a log-structured manner.

所述云计算中心用于在所述边缘服务层过载或服务要求容忍延迟时,处理使所述边缘服务层过载的数据或所述服务。The cloud computing center is configured to process the data or the service overloading the edge service layer when the edge service layer is overloaded or the service is required to tolerate delay.

边缘服务节点:边缘服务节点集合为边缘计算框架赋予了高速数据处理的能力。边缘服务节点将计算和存储分为独立的实体,每个计算实体通过区块链网络连接并维护一条公有区块链。基于此思路,将边缘服务节点设计成了以下两种类型的实体:Edge service node: The set of edge service nodes endows the edge computing framework with the capability of high-speed data processing. Edge service nodes divide computing and storage into independent entities, and each computing entity is connected through a blockchain network and maintains a public blockchain. Based on this idea, edge service nodes are designed into the following two types of entities:

具体的,关于通用计算节点:考虑到安全性,本架构并未将所有通用计算节点直接暴露给边缘代理节点,而是通过智能合约进行访问。在这种情况下,智能合约可以充当通用计算节点的防火墙。此外,智能合约监控区块链网络中服务器资源,并将数据与可执行的后端应用程序一起转发以进行处理。在执行分布式应用程序时,通用计算节点在智能合约的监督下形成集群。通用计算节点可以与多个代理节点有关。在这种情况下,使用基本的向量时钟用于系统同步。向量时钟可帮助通用计算节点识别不同代理节点发出给它们的并发命令。稍后,并发命令由通用计算节点任意排序,并通知相应的代理节点。在执行命令时,通用计算节点以一对一的方式与关联的代理节点进行交互。此外,为了确保应用程序级别的一致性,通用计算节点一次最多执行一个应用程序。Specifically, about general-purpose computing nodes: Considering security, this architecture does not directly expose all general-purpose computing nodes to edge proxy nodes, but accesses them through smart contracts. In this case, smart contracts can act as firewalls for general computing nodes. Additionally, smart contracts monitor server resources in the blockchain network and forward the data along with executable backend applications for processing. When executing distributed applications, general-purpose computing nodes form clusters under the supervision of smart contracts. A general computing node may be associated with multiple proxy nodes. In this case, the basic vector clock is used for system synchronization. Vector clocks help general-purpose compute nodes to identify concurrent commands issued to them by different agent nodes. Later, concurrent commands are arbitrarily ordered by the general-purpose compute nodes, and the corresponding agent nodes are notified. When executing commands, general computing nodes interact with the associated agent nodes in a one-to-one manner. Additionally, to ensure application-level consistency, general-purpose compute nodes execute at most one application at a time.

所述通用计算节点中存储区块链信息,所述区块链信息包括数据的索引信息;所述存储库节点用于存储索引信息对应数据。The general computing node stores block chain information, and the block chain information includes index information of data; the storage library node is used for storing data corresponding to the index information.

至于存储库节点:存储库节点提供用于即时访问和分析历史数据的接口。它们维护各种应用程序的元数据,包括应用程序模型,运行时环境配置和依赖项。而且,这些节点可以在应用程序执行期间保留一些中间数据,以便从任何异常驱动的停止点开始进行数据处理。此外,为了确保数据级别的一致性,存储库节点以日志结构化的方式管理所有数据。As for the repository node: The repository node provides an interface for instant access and analysis of historical data. They maintain various application metadata, including the application model, runtime environment configuration, and dependencies. Also, these nodes can retain some intermediate data during application execution for data processing from any exception-driven stopping point. Furthermore, to ensure data-level consistency, repository nodes manage all data in a log-structured manner.

云计算中心:当边缘计算基础架构过载或服务要求容忍延迟时,边缘计算会将来自云计算中心的资源扩展到后端物联网应用程序。通过云计算中心,边缘计算扩展了物联网应用的计算平台。与存储库节点关联,它可以促进广泛的数据存储和分发,从而使数据的访问和处理变得与位置无关。Cloud computing center: When edge computing infrastructure is overloaded or services are required to tolerate latency, edge computing extends resources from cloud computing centers to backend IoT applications. Through cloud computing centers, edge computing expands the computing platform for IoT applications. Associated with repository nodes, it facilitates widespread data storage and distribution, making data access and processing location-independent.

实施例3Example 3

本发明实施例3还提出了一种基于区块链的边缘计算网络架构,在实施例1与实施例2的基础上,所述代理节点中设置有代理组件;所述代理组件包括:函数映射模块、设备注册模块、区块链认证模块、高速通道;其中,所述函数映射模块用于获取所述边缘服务器上各应用的信息和地址,管理所述边缘服务器上不同应用的映射信息,将应用信息和应用数据传输到所述边缘服务器的任务队列;所述设备注册模块用于对针对所述终端进行注册;所述区块链认证模块用于实现所述边缘服务器上的应用与所述终端之间的双向认证;所述高速通道用于连接所述云计算中心。Embodiment 3 of the present invention also proposes an edge computing network architecture based on blockchain. On the basis of Embodiment 1 and Embodiment 2, the proxy node is provided with a proxy component; the proxy component includes: a function map module, device registration module, blockchain authentication module, and high-speed channel; wherein, the function mapping module is used to obtain the information and addresses of each application on the edge server, manage the mapping information of different applications on the edge server, and map Application information and application data are transmitted to the task queue of the edge server; the device registration module is used to register the terminal; the blockchain authentication module is used to realize the application on the edge server and the Two-way authentication between terminals; the high-speed channel is used to connect the cloud computing center.

所述通用计算节点中设置有计算组件,所述计算组件包括:任务队列模块、监视单元、应用执行器、安全控制模块;其中,所述任务队列模块中包括多个队列的集合,用于在不同队列之间调度任务;监视单元,用于监视计算机资源的忙/闲状态;还用于当检测到资源负载超过预定阈值或发生不确定故障时,进入紧急状态;还用于当计算机资源不足或任务队列溢出时,将任务知悉的上下文与数据源进行答辩,生成交易请求发送给所述公有区块链中的智能合约;所述应用执行器用于执行任务;所述安全控制模块用于保障所述应用执行器的数据安全。The general computing node is provided with a computing component, and the computing component includes: a task queue module, a monitoring unit, an application executor, and a security control module; wherein, the task queue module includes a set of multiple queues for Scheduling tasks between different queues; monitoring unit, used to monitor the free/busy status of computer resources; also used to enter an emergency state when it is detected that the resource load exceeds a predetermined threshold or an uncertain failure occurs; also used when computer resources are insufficient Or when the task queue overflows, the context and the data source known by the task are defended, and a transaction request is generated and sent to the smart contract in the public blockchain; the application executor is used to execute the task; the security control module is used to ensure Data security of the application executor.

所述存储库节点中设置有存储模块,所述存储模块包括:认证中心、镜像目录模块、数据库、高速缓冲区、镜像文件区、身份信息区、云扩展器;其中,所述认证中心用于存储初始化是设置的通用计算节点的认证凭证;还用于对所述数据库中的数据进行加密和解密;还用于定期更新自身在云计算中心的镜像;所述镜像目录模块,用于存储镜像文件的信息,还用于连接通用计算节点上的应用执行器;所述数据库,用于存储所述终端、所述应用执行器以及所述云扩展器的数据;所述高速缓冲区,用于存储频率高于预设值得数据;所述镜像文件区,用于存储应用程序的镜像文件;所述身份信息区,用于获取认证中心的验证结果,且与所述云扩展器进行同步关联;所述云扩展器,用于扩展应用程序规范,传输安全属性和交换数据。The storage library node is provided with a storage module, and the storage module includes: an authentication center, an image directory module, a database, a high-speed buffer, an image file area, an identity information area, and a cloud extender; wherein, the authentication center is used for The storage initialization is the authentication credential of the set general computing node; it is also used to encrypt and decrypt the data in the database; it is also used to regularly update its own image in the cloud computing center; the image directory module is used to store the image The information of the file is also used to connect the application executor on the general computing node; the database is used to store the data of the terminal, the application executor and the cloud extender; the high-speed buffer is used for The storage frequency is higher than the preset value data; the image file area is used to store the image file of the application program; the identity information area is used to obtain the verification result of the certification center, and is synchronously associated with the cloud extender; The cloud extender is used to extend application specifications, transmit security attributes and exchange data.

具体的,如图3所示,为了简化本方案的架构,可以使用各种相互关联的组件来处理操作系统和不同硬件设备P2P通信的异构性。具体的组件可以分为三类:代理组件、计算组件和存储组件。边缘代理节点执行代理组件的功能,并根据需要访问其他组件。边缘计算服务器负责计算组件的操作,当代理节点开始执行后端应用程序时,将在其流程中访问边缘服务器,从而触发计算服务。存储组件可以在所有存储节点上运行,管理与存储库相关的操作。Specifically, as shown in FIG. 3 , in order to simplify the architecture of this solution, various interrelated components can be used to deal with the heterogeneity of the P2P communication between the operating system and different hardware devices. The specific components can be divided into three categories: proxy components, computing components and storage components. Edge proxy nodes perform the functions of proxy components and access other components as needed. The edge computing server is responsible for the operation of the computing components, and when the proxy node starts to execute the backend application, it will access the edge server in its process, thereby triggering the computing service. Storage components can run on all storage nodes and manage operations related to the repository.

其中,代理组件包括以下部分:Among them, the agent component includes the following parts:

函数映射模块:该模块负责获取边缘服务器上应用程序的信息和地址,管理计算节点的应用执行器上不同应用的映射信息。同时,接收代理节点的应用请求,将应用信息和源数据传输到边缘服务器的任务队列。区块链认证模块辅助函数映射模块完成注册设备的身份信息认证。认证通过后,边缘服务器将默认该请求可信,因为下级边缘代理节点发送的请求已经得到安全认证。此外,此组件维护一个资源映射表,该表跟踪边缘服务节点实例的地址,以便后续数据流可以直接发送到有效的资源地址进行处理。Function mapping module: This module is responsible for obtaining the information and addresses of the applications on the edge server, and managing the mapping information of different applications on the application executor of the computing node. At the same time, it receives the application request of the proxy node, and transmits the application information and source data to the task queue of the edge server. The blockchain authentication module assists the function mapping module to complete the identity information authentication of the registered device. After the authentication is passed, the edge server will acquiesce that the request is credible, because the request sent by the lower-level edge proxy node has been securely authenticated. Additionally, this component maintains a resource mapping table that tracks the addresses of edge service node instances so that subsequent data streams can be sent directly to valid resource addresses for processing.

设备注册模块:当物联网设备出厂时,生成公私钥和自签名证书,由制造商写入设备,并向区块链身份认证模块提交发布申请。区块链认证模块对证书检查后,将证书记录到区块链中。Device registration module: When the IoT device leaves the factory, a public and private key and a self-signed certificate are generated, written into the device by the manufacturer, and a release application is submitted to the blockchain identity authentication module. After the blockchain authentication module checks the certificate, it records the certificate in the blockchain.

区块链认证模块:物联网终端和边缘计算应用之间需要建立连接时物联网终端向边缘计算应用发送证书标识,边缘计算应用向区块链身份认证系统查询证书,区块链认证模块返回证书及状态,边缘计算应用对设备进行认证,物联网设备以同样方式对边缘计算应用进行认证。之后两者继续进行TLS握手流程,建立安全的数据传送通道。Blockchain authentication module: When a connection needs to be established between the IoT terminal and the edge computing application, the IoT terminal sends the certificate identification to the edge computing application, the edge computing application queries the certificate to the blockchain identity authentication system, and the blockchain authentication module returns the certificate and status, edge computing applications authenticate devices, and IoT devices authenticate edge computing applications in the same way. After that, the two continue to perform the TLS handshake process to establish a secure data transmission channel.

高速通道:一般情况下,边缘代理的请求通过功能映射控制发送,并被边缘服务节点接受。当需求的延迟容忍度较大,并且需要人工智能、大数据等数据密集型技术来处理需求时,边缘代理会通过该组件直接将需求发送到云端。它将云实例的上下文通知给框架,并将存储和资源配置命令转发给云。Expressway: In general, the request of the edge agent is sent through the function map control and accepted by the edge service node. When the delay tolerance of the demand is large, and data-intensive technologies such as artificial intelligence and big data are required to process the demand, the edge agent will directly send the demand to the cloud through this component. It informs the framework of the context of the cloud instance and forwards storage and resource configuration commands to the cloud.

计算模块包括以下部分:The calculation module includes the following parts:

任务队列模块:该组件是一系列队列的集合,例如执行队列、就绪队列、挂起队列。计算节点使用多线程技术来允许执行队列中的多个任务同时运行。当任务队列中的数据已就绪时,将从队列的队列中选择一个空闲的应用程序,并将其数据加载到队列的头部。有时,由于外部因素,执行队列中的任务将被迫暂停操作。此时,挂起的任务将被转移到挂起队列中,并相应地保存任务的上下文和中间数据。任务队列在不同队列之间调度任务。当执行队列溢出时,主动向监控单元发出报警,并将溢出任务转移到挂起队列中,由监控单元完成后续操作。Task queue module: This component is a collection of a series of queues, such as execute queue, ready queue, pending queue. Compute nodes use multithreading technology to allow multiple tasks in the execution queue to run simultaneously. When the data in the task queue is ready, an idle application will be selected from the queue's queue and its data will be loaded into the head of the queue. Sometimes tasks in the execution queue will be forced to suspend operations due to external factors. At this point, the pending task will be transferred to the pending queue, and the task's context and intermediate data will be saved accordingly. Task queues schedule tasks between different queues. When the execution queue overflows, it actively sends an alarm to the monitoring unit, and transfers the overflow task to the pending queue, and the monitoring unit completes the subsequent operations.

监视单元:此组件监视计算机资源的忙/闲状态(例如:CPU使用率,内存占用,网络使用率,功耗等)。根据这些感知的信息,监视单元为不同的应用程序提供资源。它还在运行时跟踪分配的资源的性能,以满足应用程序的QoS要求。每当资源负载超过服务提供商定义的阈值或发生不确定的故障时,监视单元都会立即进入紧急状态。监视单元可以启动一些操作,例如备用资源供应,应用程序执行迁移和中间数据存储。监视单元中最重要的功能之一是应用程序执行迁移,当计算资源稀缺或任务队列溢出时,监视器单元将打包任务执行上下文和数据源,生成交易请求并将其发送到智能合约。智能合约将找到合适的计算节点作为服务提供商,然后在“消费者”和“提供者”之间建立P2P通信链接,双方在P2P链接上完成交易。Monitoring Unit: This component monitors the free/busy status of computer resources (eg: CPU usage, memory usage, network usage, power consumption, etc.). Based on these sensed information, the monitoring unit provides resources for different applications. It also tracks the performance of allocated resources at runtime to meet application QoS requirements. Whenever the resource load exceeds a threshold defined by the service provider or an indeterminate failure occurs, the monitoring unit immediately enters an emergency state. The monitoring unit can initiate operations such as alternate resource provisioning, application execution migration and intermediate data storage. One of the most important functions in the monitoring unit is application execution migration. When computing resources are scarce or the task queue overflows, the monitoring unit will package the task execution context and data source, generate transaction requests and send them to the smart contract. The smart contract will find a suitable computing node as a service provider, and then establish a P2P communication link between the "consumer" and the "provider", and the two parties complete the transaction on the P2P link.

应用执行器:任务的执行需要经过环境配置、容器加载、数据输入、执行计算、输出结果等阶段,以上过程都在应用执行器中完成。应用程序执行器从镜像目录扩展应用程序可执行文件,以便在分配的资源上部署。一旦应用程序部署完成,它就开始接收由函数映射控件转发的数据进行处理。在多核体系结构中,由于环境切换成本较高,该组件将优先选择与就绪队列中的前一个任务类型相同的任务。但是,为了保证任务流中每个任务的等待时间是最优的,当延迟的任务达到一定次数后,该组件的环境将被迫切换。该组件完成的每个任务都将作为一个交易记录在区块链上。此外,该组件定期向监控单元通知资源的状态。当检测到或预测到任何异常时,监控单元会要求该组件从应用程序执行中提取中间数据并进行存储,以使框架具有容错性。Application executor: The execution of tasks needs to go through the stages of environment configuration, container loading, data input, execution calculation, and output results. The above processes are all completed in the application executor. The application executor expands the application executable from the image directory for deployment on the allocated resources. Once the application is deployed, it starts receiving data forwarded by the function map control for processing. In a multi-core architecture, due to the high cost of context switching, this component will prefer tasks of the same type as the previous task in the ready queue. However, in order to ensure that the waiting time of each task in the task flow is optimal, when the delayed task reaches a certain number of times, the environment of the component will be forced to switch. Every task done by this component will be recorded on the blockchain as a transaction. In addition, the component periodically informs the monitoring unit of the status of the resource. When any anomaly is detected or predicted, the monitoring unit asks the component to extract intermediate data from application execution and store it to make the framework fault tolerant.

安全控制模块:该模块是连接区块链网络的桥梁。在执行计算操作时,应用程序执行器与其他执行器之间的无缝安全交互由安全控件管理。存储库服务的身份验证中心为该组件提供所需的安全属性。与认证中心一起,该组件在验证区块链方面起着重要作用。Security Control Module: This module is a bridge connecting the blockchain network. The seamless and secure interaction between application executors and other executors when performing computational operations is managed by security controls. The Repository Service's Authentication Center provides the required security properties for this component. Along with the certification authority, this component plays an important role in validating the blockchain.

存储模块包括以下部分:The storage module includes the following parts:

认证中心:区块链网络初始化时设置的通用计算节点的认证凭证保存在认证中心。它将智能合约生成的每个数据块的安全密钥和详细信息分发给其他人。该组件还为云集成提供了安全套接字层(SSL)和传输层安全(TLS)证书。此外,它还支持数据库对存储的数据进行加密和解密。通过存储服务器的云扩展器,它定期更新自己在云上的映像,以便在不确定的故障发生后,安全属性能够很容易地恢复和分布。Authentication Center: The authentication credentials of the general computing nodes set when the blockchain network is initialized are stored in the authentication center. It distributes the security keys and details of each block of data generated by the smart contract to others. The component also provides Secure Sockets Layer (SSL) and Transport Layer Security (TLS) certificates for cloud integration. In addition, it supports database encryption and decryption of stored data. Through the storage server's cloud extender, it periodically updates its image on the cloud so that security attributes can be easily recovered and distributed after an uncertain failure.

镜像目录模块:此组件负责维护各种镜像文件的详细信息,包括它们的操作、开发人员推荐的系统属性、执行和编程模型、数据库中的内存地址映射。此外,它还指定应用程序及其成员任务的资源权限和依赖关系。镜像目录可以通过云扩张器从云中扩展这些信息。该组件与通用计算节点上的应用执行器紧密相连。它不仅接受应用执行器发送的镜像文件请求,还可以监控数据库中的镜像文件版本,并根据应用执行器的要求执行更新操作。Image Directory Module: This component is responsible for maintaining the details of various image files, including their operations, system properties recommended by developers, execution and programming models, and memory address mappings in the database. In addition, it specifies resource permissions and dependencies for the application and its member tasks. Mirror catalogs can expand this information from the cloud via cloud expanders. This component is tightly coupled to the application executor on the general purpose compute node. It not only accepts image file requests sent by the application executor, but also monitors the image file version in the database and performs update operations according to the application executor's request.

数据库:从物联网设备、应用执行器和云扩展器接收到的数据存储在数据库中,可用于长期分析。在这里,通过应用加密技术来确保数据隐私。根据数据来源的不同、类型和用途的不同,我们将数据库分为以下几个区域:Database: Data received from IoT devices, application executors, and cloud extenders is stored in a database and can be used for long-term analysis. Here, data privacy is ensured by applying encryption techniques. Depending on the source, type and purpose of the data, we divide the database into the following areas:

高速缓存区,用于存储更高频率的数据;Cache area for storing higher frequency data;

镜像文件区,用于存储应用程序的镜像文件;Image file area, used to store the image file of the application;

身份信息区,其中也使用了存储认证中心的验证结果。此外,数据容器与云扩展器保持同步关联,以抓取远程数据,并通过云分散本地数据。The identity information area, which also uses the verification result of the storage certificate authority. In addition, data containers are kept in sync with cloud extenders to grab remote data and disperse local data through the cloud.

云扩展器:此组件可促进数据库服务的其他软件组件云端进行交互。在这种情况下,通用计算节点的应用执行器可协助云扩展器提供所需的命令,以扩展应用程序规范,传输安全属性和交换数据。Cloud Extender: This component facilitates the interaction of other software components of the database service in the cloud. In this case, the application executor of the general-purpose computing node can assist the cloud extender to provide the required commands to extend the application specification, transmit security attributes and exchange data.

具体的,边缘代理是在边缘侧具有一定智能的硬件设备,并且只与本地网络一起工作。边缘代理由单板计算机组成,如Raspberry Pi系列板、Nvidia Jetson和Intel UP板,这些板具有足够的计算能力来运行为资源受限设备设计的算法。Specifically, the edge agent is a hardware device with certain intelligence on the edge side, and only works with the local network. Edge agents consist of single-board computers, such as Raspberry Pi series boards, Nvidia Jetson, and Intel UP boards, that have enough computing power to run algorithms designed for resource-constrained devices.

物联网设备由多个执行器或传感器组成,它们不具备直接参与区块链网络的任何计算能力。因此,物联网设备需要安装在边缘代理上,这些设备的请求由代理发起并执行。在边缘代理之间,维护一个私有区块链来记录每个设备的身份信息和请求记录。边缘代理验证设备的身份后,对当前请求的源数据、目标对象、请求类型等信息进行加密存储。基于注册信息的隐私许可,特定数据块将被确定为公开或不公开。IoT devices consist of multiple actuators or sensors that do not possess any computing power to directly participate in the blockchain network. Therefore, IoT devices need to be installed on edge proxies, and requests from these devices are initiated and executed by the proxies. Between edge proxies, a private blockchain is maintained to record identity information and request records for each device. After the edge agent verifies the identity of the device, it encrypts and stores information such as the source data, target object, and request type of the current request. Based on the privacy permission of the registration information, certain data blocks will be determined to be public or private.

虽然私有区块链由边缘服务器生成,但恶意设备很难通过伪造边缘服务器的身份来控制私有区块链。众多边缘服务器形成一个区块链网络并维护一个公有区块链。每个边缘服务器的身份数据存储在公有区块链中。该区块链是由众多通用计算节点生成并维护的分布式账本,用于保护网络中流通的数据。边缘服务器不仅由通用计算节点组成,还包括专门用于存储和数据验证的服务器。公有区块链旨在模拟物联网云数据中心的存储能力。Although private blockchains are generated by edge servers, it is difficult for malicious devices to control private blockchains by forging the identity of edge servers. Numerous edge servers form a blockchain network and maintain a public blockchain. The identity data of each edge server is stored in the public blockchain. The blockchain is a distributed ledger generated and maintained by numerous general-purpose computing nodes to protect the data circulating in the network. Edge servers not only consist of general-purpose computing nodes, but also dedicated servers for storage and data verification. Public blockchains are designed to emulate the storage capabilities of IoT cloud data centers.

如图4所示的序列图中体现了数据处理、加密和存储块描述了从物联网设备生成数据、在边缘代理处进行处理以及在边缘服务器上存储的完整流程。以此,边缘代理层收集和汇总重要或有用的数据,然后以统一格式提交给通用计算节点。边缘代理层的身份和数据的合法性得到验证后,区块可以记录在公有区块链上。通用计算节点中的原始数据被保存在通用计算节点的数据块中,而不是保存在通用计算节点的原始数据块中。若当前通用计算节点无法提供完成任务所需的资源时,可以将任务信息打包成块,发布到区块链网络上寻求帮助。The data processing, encryption, and storage blocks depicted in the sequence diagram shown in Figure 4 describe the complete flow of data generation from IoT devices, processing at edge agents, and storage on edge servers. In this way, the edge proxy layer collects and aggregates important or useful data, and then submits it to general-purpose computing nodes in a unified format. After the identity of the edge proxy layer and the legitimacy of the data are verified, the block can be recorded on the public blockchain. The original data in the general-purpose computing node is stored in the data block of the general-purpose computing node, not in the original data block of the general-purpose computing node. If the current general computing node cannot provide the resources required to complete the task, the task information can be packaged into blocks and published on the blockchain network for help.

本领域技术人员可以理解附图只是一个优选实施场景的示意图,附图中的模块或流程并不一定是实施本发明所必须的。Those skilled in the art can understand that the accompanying drawing is only a schematic diagram of a preferred implementation scenario, and the modules or processes in the accompanying drawing are not necessarily necessary to implement the present invention.

本领域技术人员可以理解实施场景中的装置中的模块可以按照实施场景描述进行分布于实施场景的装置中,也可以进行相应变化位于不同于本实施场景的一个或多个装置中。上述实施场景的模块可以合并为一个模块,也可以进一步拆分成多个子模块。Those skilled in the art can understand that the modules in the device in the implementation scenario may be distributed in the device in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the implementation scenario with corresponding changes. The modules of the above implementation scenarios may be combined into one module, or may be further split into multiple sub-modules.

上述本发明序号仅仅为了描述,不代表实施场景的优劣。The above serial numbers of the present invention are only for description, and do not represent the pros and cons of the implementation scenarios.

以上公开的仅为本发明的几个具体实施场景,但是,本发明并非局限于此,任何本领域的技术人员能思之的变化都应落入本发明的保护范围。The above disclosures are only a few specific implementation scenarios of the present invention, however, the present invention is not limited thereto, and any changes that can be conceived by those skilled in the art should fall within the protection scope of the present invention.

Claims (9)

1.一种基于区块链的边缘计算网络系统,其特征在于,包括:终端、设有私有区块链的边缘代理层、设有公有区块链的边缘服务层及云计算中心;其中,所述终端通过所述边缘代理层连接所述边缘服务层;所述边缘服务层连接所述云计算中心;1. an edge computing network system based on block chain, is characterized in that, comprises: terminal, is provided with the edge agent layer of private block chain, is provided with the edge service layer of public block chain and cloud computing center; Wherein, The terminal is connected to the edge service layer through the edge proxy layer; the edge service layer is connected to the cloud computing center; 所述边缘代理层,用于通过所述私有区块链中已认证终端的身份信息判断接入的终端是否为已认证终端;若判断结果为是,则执行所述终端的数据发送与接收;The edge proxy layer is used to judge whether the accessed terminal is an authenticated terminal according to the identity information of the authenticated terminal in the private blockchain; if the judgment result is yes, execute data transmission and reception of the terminal; 所述边缘服务层,用于通过所述公有区块链中的身份认证功能对所述边缘代理层进行认证,若认证通过,则执行所述终端的请求;所述边缘服务层由多个边缘服务节点组成,所述边缘服务节点分为通用计算节点与存储库节点,所述通用计算节点需要通过智能合约进行访问;所述通用计算节点在受理所述边缘代理层的业务请求的同时管理所述私有区块链的运行,多个所述通用计算节点连接并维护所述公有区块链;所述通用计算节点中存储区块链信息,所述区块链信息包括数据的索引信息;所述存储库节点用于存储索引信息对应数据。The edge service layer is used to authenticate the edge proxy layer through the identity authentication function in the public blockchain, and if the authentication is passed, execute the request of the terminal; the edge service layer consists of multiple edges. It consists of service nodes. The edge service nodes are divided into general computing nodes and repository nodes. The general computing nodes need to be accessed through smart contracts; For the operation of the private blockchain, a plurality of the general-purpose computing nodes are connected to and maintain the public blockchain; the general-purpose computing nodes store blockchain information, and the blockchain information includes data index information; The repository node is used to store the data corresponding to the index information. 2.如权利要求1所述的网络系统,其特征在于,所述终端包括用于感知外部环境的传感器和/或将命令转换为物理动作的执行器。2. The network system of claim 1, wherein the terminal comprises a sensor for sensing an external environment and/or an actuator for converting commands into physical actions. 3.如权利要求1所述的网络系统,其特征在于,所述边缘代理层由多个代理节点组成;所述代理节点以无线或有线的方式与所述终端连接;3. The network system according to claim 1, wherein the edge proxy layer is composed of a plurality of proxy nodes; the proxy nodes are connected with the terminal in a wireless or wired manner; 所述代理节点提供应用程序的前端交互界面,以便用户设置身份验证凭据、访问后端程序、传达服务请求、接收服务结果及管理所述终端;The proxy node provides the front-end interactive interface of the application, so that the user can set authentication credentials, access the back-end program, communicate service requests, receive service results and manage the terminal; 所述代理节点用于根据业务量和承受能力来控制资源请求;The proxy node is used to control resource requests according to traffic and affordability; 所述代理节点还用于对接收的业务数据进行过滤并以转换为通用格式;The proxy node is also used to filter the received service data and convert it into a common format; 所述代理节点还用于在大规模数据处理,边缘代理节点将数据进行转发到私有区块链网络中的其他计算实例。The proxy node is also used for large-scale data processing, and the edge proxy node forwards the data to other computing instances in the private blockchain network. 4.如权利要求3所述的网络系统,其特征在于,所述代理节点中设置有代理组件;所述代理组件包括:函数映射模块、设备注册模块、区块链认证模块、高速通道;其中,4. The network system according to claim 3, wherein a proxy component is provided in the proxy node; the proxy component comprises: a function mapping module, a device registration module, a blockchain authentication module, and a high-speed channel; wherein , 所述函数映射模块用于获取边缘服务器上各应用的信息和地址,管理所述边缘服务器上不同应用的映射信息,将应用信息和应用数据传输到所述边缘服务器的任务队列;The function mapping module is used to obtain the information and addresses of each application on the edge server, manage the mapping information of different applications on the edge server, and transmit the application information and application data to the task queue of the edge server; 所述设备注册模块用于对针对所述终端进行注册;The device registration module is configured to register the terminal; 所述区块链认证模块用于实现所述边缘服务器上的应用与所述终端之间的双向认证;The blockchain authentication module is used to implement two-way authentication between the application on the edge server and the terminal; 所述高速通道用于连接所述云计算中心。The high-speed channel is used to connect the cloud computing center. 5.如权利要求1所述的网络系统,其特征在于,所述通用计算节点使用向量时钟实现同步;在执行命令时,所述通用计算节点以一对一的方式与关联的代理节点进行交互所述通用计算节点一次最多执行一个应用程序;5. The network system of claim 1, wherein the general computing node uses a vector clock to achieve synchronization; when executing a command, the general computing node interacts with an associated proxy node in a one-to-one manner The general-purpose computing node executes at most one application at a time; 所述存储库节点提供用于即时访问和分析历史数据的接口,所述存储库节点以日志结构化的方式管理所有数据。The repository node provides an interface for instant access and analysis of historical data, and the repository node manages all data in a log-structured manner. 6.如权利要求5所述的网络系统,其特征在于,所述通用计算节点中设置有计算组件,所述计算组件包括:任务队列模块、监视单元、应用执行器、安全控制模块;其中,6. The network system according to claim 5, wherein a computing component is provided in the general computing node, and the computing component comprises: a task queue module, a monitoring unit, an application executor, and a security control module; wherein, 所述任务队列模块中包括多个队列的集合,用于在不同队列之间调度任务;The task queue module includes a collection of multiple queues for scheduling tasks between different queues; 监视单元,用于监视计算机资源的忙/闲状态;还用于当检测到资源负载超过预定阈值或发生不确定故障时,进入紧急状态;还用于当计算机资源不足或任务队列溢出时,将任务知悉的上下文与数据源进行答辩,生成交易请求发送给所述公有区块链中的智能合约;The monitoring unit is used to monitor the free/busy state of computer resources; it is also used to enter an emergency state when it is detected that the resource load exceeds a predetermined threshold or an uncertain failure occurs; it is also used to set the The context and the data source known by the task are defended, and a transaction request is generated and sent to the smart contract in the public blockchain; 所述应用执行器用于执行任务;the application executor is used to execute a task; 所述安全控制模块用于保障所述应用执行器的数据安全。The security control module is used to ensure data security of the application executor. 7.如权利要求5所述的网络系统,其特征在于,所述存储库节点中设置有存储模块,所述存储模块包括:认证中心、镜像目录模块、数据库、高速缓冲区、镜像文件区、身份信息区、云扩展器;其中,7. The network system according to claim 5, wherein a storage module is provided in the storage repository node, and the storage module comprises: a certification center, a mirror directory module, a database, a high-speed buffer, a mirror file area, Identity information area, cloud extender; among them, 所述认证中心用于存储初始化是设置的通用计算节点的认证凭证;还用于对所述数据库中的数据进行加密和解密;还用于定期更新自身在云计算中心的镜像;The authentication center is used to store the authentication credentials of the general computing node whose initialization is set; it is also used to encrypt and decrypt the data in the database; it is also used to regularly update its own image in the cloud computing center; 所述镜像目录模块,用于存储镜像文件的信息,还用于连接通用计算节点上的应用执行器;The mirror directory module is used to store the information of the mirror file, and is also used to connect the application executor on the general computing node; 所述数据库,用于存储所述终端、所述应用执行器以及所述云扩展器的数据;the database for storing data of the terminal, the application executor and the cloud extender; 所述高速缓冲区,用于存储频率高于预设值得数据;The high-speed buffer is used to store data whose frequency is higher than the preset value; 所述镜像文件区,用于存储应用程序的镜像文件;The image file area is used to store the image file of the application; 所述身份信息区,用于获取认证中心的验证结果,且与所述云扩展器进行同步关联;The identity information area is used to obtain the verification result of the certification center, and is synchronously associated with the cloud extender; 所述云扩展器,用于扩展应用程序规范,传输安全属性和交换数据。The cloud extender is used to extend application specifications, transmit security attributes and exchange data. 8.如权利要求1所述的网络系统,其特征在于,所述云计算中心用于在所述边缘服务层过载或服务要求容忍延迟时,处理使所述边缘服务层过载的数据或所述服务。8 . The network system according to claim 1 , wherein the cloud computing center is configured to process data that overloads the edge service layer or the edge service layer when the edge service layer is overloaded or service requirements tolerate delay. 9 . Serve. 9.如权利要求1所述的网络系统,其特征在于,所述私有区块链中还存储有所述终端的请求记录和指令记录,以使所述终端所有的操作都可被溯源。9 . The network system according to claim 1 , wherein the private blockchain further stores request records and instruction records of the terminal, so that all operations of the terminal can be traced to the source. 10 .
CN202110356016.6A 2021-04-01 2021-04-01 Edge computing network system based on block chain Active CN113079159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110356016.6A CN113079159B (en) 2021-04-01 2021-04-01 Edge computing network system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110356016.6A CN113079159B (en) 2021-04-01 2021-04-01 Edge computing network system based on block chain

Publications (2)

Publication Number Publication Date
CN113079159A CN113079159A (en) 2021-07-06
CN113079159B true CN113079159B (en) 2022-06-10

Family

ID=76614458

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110356016.6A Active CN113079159B (en) 2021-04-01 2021-04-01 Edge computing network system based on block chain

Country Status (1)

Country Link
CN (1) CN113079159B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113590328B (en) * 2021-08-02 2023-06-27 重庆大学 Edge computing service interaction method and system based on block chain
CN113328864B (en) * 2021-08-03 2021-12-07 北京理工大学 Data transmission method and system based on function encryption, block chain and machine learning
CN113612854B (en) * 2021-08-16 2023-07-25 中国联合网络通信集团有限公司 Communication method, server and terminal based on block chain
CN113949575B (en) * 2021-10-19 2024-10-18 中国电子科技集团公司第二十研究所 Block chain frame design data storage method based on edge node calculation
CN114500049B (en) * 2022-01-26 2022-11-11 北京邮电大学 Identity authentication method and system for mobile terminal equipment in Internet of things system
CN114726836A (en) * 2022-04-25 2022-07-08 四川智能建造科技股份有限公司 Distributed application distribution deployment method and system
CN115118449B (en) * 2022-05-13 2023-06-27 国网浙江省电力有限公司信息通信分公司 Energy internet-oriented safe and efficient interactive edge proxy server
CN115550375B (en) * 2022-08-31 2024-03-15 云南电网有限责任公司信息中心 System, method and equipment for realizing block chain light weight based on containerization technology
CN116455674B (en) * 2023-06-05 2023-08-18 天津市城市规划设计研究总院有限公司 User identity information management method based on block chain
CN117494111A (en) * 2023-09-11 2024-02-02 德浦勒仪表(广州)有限公司 Edge computing system and method for data processing and transmission of industrial flowmeter
CN117412349A (en) * 2023-12-13 2024-01-16 湖南大学无锡智能控制研究院 Service switching method, device and system based on edge server performance
CN118233461B (en) * 2024-04-17 2024-08-30 安徽大学 Data set placement method based on edge cloud collaborative computing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769031A (en) * 2018-05-31 2018-11-06 中化能源科技有限公司 The material object of edge calculations service based on block chain deposits card traceability system
CN109302405A (en) * 2018-10-31 2019-02-01 北京邮电大学 Blockchain network architecture and detection method for industrial data detection based on edge computing
CN110928678A (en) * 2020-01-20 2020-03-27 西北工业大学 A resource allocation method for blockchain system based on mobile edge computing

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10346406B2 (en) * 2016-03-28 2019-07-09 International Business Machines Corporation Decentralized autonomous edge compute coordinated by smart contract on a blockchain
US11611491B2 (en) * 2018-04-12 2023-03-21 Intel Corporation Edge computing service global validation
US11283635B2 (en) * 2019-09-28 2022-03-22 Intel Corporation Dynamic sharing in secure memory environments using edge service sidecars
CN111753269A (en) * 2020-06-24 2020-10-09 海南大学 A blockchain-based identity authentication method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769031A (en) * 2018-05-31 2018-11-06 中化能源科技有限公司 The material object of edge calculations service based on block chain deposits card traceability system
CN109302405A (en) * 2018-10-31 2019-02-01 北京邮电大学 Blockchain network architecture and detection method for industrial data detection based on edge computing
CN110928678A (en) * 2020-01-20 2020-03-27 西北工业大学 A resource allocation method for blockchain system based on mobile edge computing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Zhang,J. et al ; .A Blockchain-Based Trusted Edge Platform in Edge Computing Environment.《Sensors》.2021,第1-16页. *
一种基于区块链和边缘计算的物联网方案;刘帅 等;《南京信息工程大学学报》;20191204(第05期);第596-600页 *
区块链在边缘计算与物联网安全领域应用;黄忠义;《网络空间安全》;20190124(第08期);第25-30页 *

Also Published As

Publication number Publication date
CN113079159A (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN113079159B (en) Edge computing network system based on block chain
Cao et al. An overview on edge computing research
CN108650262B (en) Cloud platform expansion method and system based on micro-service architecture
Awaysheh et al. Next-generation big data federation access control: A reference model
US11941155B2 (en) Secure data management in a network computing environment
WO2020186807A1 (en) System and method for power data linking based on blockchain technology
CN111552676A (en) Block chain based evidence storing method, device, equipment and medium
CN112583882A (en) Methods, systems, articles of manufacture, and apparatus for managing telemetry data in an edge environment
CN105471969B (en) Power grid data processing cloud platform system
Andersen et al. Democratizing authority in the built environment
US20190288922A1 (en) System and methods for scalable cloud-based platform and related applications
CN103916625A (en) Video monitoring system and method based on cloud computing
Cunsolo et al. Cloud@ home: Bridging the gap between volunteer and cloud computing
KR20140054950A (en) System and method of data federation module for sociality storage service on cloud computing
US20230134683A1 (en) Memory interleaving coordinated by networked processing units
TW202301118A (en) Dynamic microservices allocation mechanism
Xu et al. A secure dynamic edge resource federation architecture for cross-domain IoT systems
CN113905094B (en) Industrial Internet integration method, device and system
CN102710628B (en) A kind of cloud security encryption method based on home gateway and system
CN118157840A (en) A data interaction method for cross-domain collaboration between cloud, edge and end
CN118337786A (en) Service container scheduling method and system based on Kubernetes under cloud edge cooperation
US20230342496A1 (en) Trust brokering and secure information container migration
CN115051989B (en) A refined distributed access control method based on blockchain in industrial Internet of Things
Huai et al. CROWN: A service grid middleware with trust management mechanism
CN115189935A (en) A centralized investigation and evidence collection system for intelligent mobile devices and an investigation and evidence collection method based thereon

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant