• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用CyberGuard框架的边缘和雾计算中的信任管理与资源优化

Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework.

作者信息

Alwakeel Ahmed M, Alnaim Abdulrahman K

机构信息

Faculty of Computers & Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia.

College of Business Administration, King Faisal University, Al Ahsa 31982, Saudi Arabia.

出版信息

Sensors (Basel). 2024 Jul 2;24(13):4308. doi: 10.3390/s24134308.

DOI:10.3390/s24134308
PMID:39001087
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11244146/
Abstract

The growing importance of edge and fog computing in the modern IT infrastructure is driven by the rise of decentralized applications. However, resource allocation within these frameworks is challenging due to varying device capabilities and dynamic network conditions. Conventional approaches often result in poor resource use and slowed advancements. This study presents a novel strategy for enhancing resource allocation in edge and fog computing by integrating machine learning with the blockchain for reliable trust management. Our proposed framework, called CyberGuard, leverages the blockchain's inherent immutability and decentralization to establish a trustworthy and transparent network for monitoring and verifying edge and fog computing transactions. CyberGuard combines the Trust2Vec model with conventional machine-learning models like SVM, KNN, and random forests, creating a robust mechanism for assessing trust and security risks. Through detailed optimization and case studies, CyberGuard demonstrates significant improvements in resource allocation efficiency and overall system performance in real-world scenarios. Our results highlight CyberGuard's effectiveness, evidenced by a remarkable accuracy, precision, recall, and F1-score of 98.18%, showcasing the transformative potential of our comprehensive approach in edge and fog computing environments.

摘要

边缘计算和雾计算在现代IT基础设施中的重要性日益凸显,这是由去中心化应用的兴起所推动的。然而,由于设备能力各异以及网络条件动态变化,这些框架内的资源分配具有挑战性。传统方法往往导致资源利用不佳和进展缓慢。本研究提出了一种新颖的策略,通过将机器学习与区块链集成以实现可靠的信任管理,来增强边缘计算和雾计算中的资源分配。我们提出的框架名为CyberGuard,利用区块链固有的不可变特性和去中心化来建立一个可信赖且透明的网络,用于监控和验证边缘计算和雾计算交易。CyberGuard将Trust2Vec模型与支持向量机(SVM)、K近邻(KNN)和随机森林等传统机器学习模型相结合,创建了一个用于评估信任和安全风险的强大机制。通过详细的优化和案例研究,CyberGuard在实际场景中展示了资源分配效率和整体系统性能的显著提升。我们的结果突出了CyberGuard的有效性,其显著的准确率、精确率、召回率和F1分数达到98.18%,证明了我们的综合方法在边缘计算和雾计算环境中的变革潜力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/fc55fa526a26/sensors-24-04308-g024.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/3ae6e8db112b/sensors-24-04308-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/abfc8a6c9f18/sensors-24-04308-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/c006b3466e59/sensors-24-04308-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/e5e3250392c5/sensors-24-04308-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/df042ef45e94/sensors-24-04308-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/a97002183c9f/sensors-24-04308-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/98dd02978960/sensors-24-04308-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/11ff67fb7270/sensors-24-04308-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/b2d432b3a027/sensors-24-04308-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/217779437c89/sensors-24-04308-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/b2765f2e1b8b/sensors-24-04308-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/adbc6944467e/sensors-24-04308-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/44fc26014644/sensors-24-04308-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/50b2325994f5/sensors-24-04308-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/7c3da2ae092d/sensors-24-04308-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/4fb7132a7d50/sensors-24-04308-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/cd29d3fdf89e/sensors-24-04308-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/4dc9a6afd798/sensors-24-04308-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/f3f7771dd64c/sensors-24-04308-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/591e039aebc9/sensors-24-04308-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/8e728fb3f810/sensors-24-04308-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/a6fe09d02a2b/sensors-24-04308-g022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/e359139cf07c/sensors-24-04308-g023.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/fc55fa526a26/sensors-24-04308-g024.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/3ae6e8db112b/sensors-24-04308-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/abfc8a6c9f18/sensors-24-04308-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/c006b3466e59/sensors-24-04308-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/e5e3250392c5/sensors-24-04308-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/df042ef45e94/sensors-24-04308-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/a97002183c9f/sensors-24-04308-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/98dd02978960/sensors-24-04308-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/11ff67fb7270/sensors-24-04308-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/b2d432b3a027/sensors-24-04308-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/217779437c89/sensors-24-04308-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/b2765f2e1b8b/sensors-24-04308-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/adbc6944467e/sensors-24-04308-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/44fc26014644/sensors-24-04308-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/50b2325994f5/sensors-24-04308-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/7c3da2ae092d/sensors-24-04308-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/4fb7132a7d50/sensors-24-04308-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/cd29d3fdf89e/sensors-24-04308-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/4dc9a6afd798/sensors-24-04308-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/f3f7771dd64c/sensors-24-04308-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/591e039aebc9/sensors-24-04308-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/8e728fb3f810/sensors-24-04308-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/a6fe09d02a2b/sensors-24-04308-g022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/e359139cf07c/sensors-24-04308-g023.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b195/11244146/fc55fa526a26/sensors-24-04308-g024.jpg

相似文献

1
Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework.使用CyberGuard框架的边缘和雾计算中的信任管理与资源优化
Sensors (Basel). 2024 Jul 2;24(13):4308. doi: 10.3390/s24134308.
2
Advancements in heuristic task scheduling for IoT applications in fog-cloud computing: challenges and prospects.雾计算-云计算环境下物联网应用启发式任务调度的研究进展:挑战与展望
PeerJ Comput Sci. 2024 Jun 17;10:e2128. doi: 10.7717/peerj-cs.2128. eCollection 2024.
3
Blockchain and K-Means Algorithm for Edge AI Computing.区块链和 K-Means 算法在边缘人工智能计算中的应用。
Comput Intell Neurosci. 2022 May 29;2022:1153208. doi: 10.1155/2022/1153208. eCollection 2022.
4
A survey of security, privacy and trust issues in vehicular computation offloading and their solutions using blockchain.车载计算卸载中的安全、隐私和信任问题调查及其区块链解决方案
Open Res Eur. 2023 Oct 25;3:110. doi: 10.12688/openreseurope.16189.2. eCollection 2023.
5
Resource Management Techniques for Cloud/Fog and Edge Computing: An Evaluation Framework and Classification.云/雾和边缘计算的资源管理技术:一个评估框架与分类
Sensors (Basel). 2021 Mar 5;21(5):1832. doi: 10.3390/s21051832.
6
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues.区块链与雾计算集成目的的系统综述:分类与开放问题
J Cloud Comput (Heidelb). 2022;11(1):80. doi: 10.1186/s13677-022-00353-y. Epub 2022 Nov 19.
7
Optimizing storage on fog computing edge servers: A recent algorithm design with minimal interference.优化雾计算边缘服务器的存储:一种具有最小干扰的最新算法设计。
PLoS One. 2024 Jul 10;19(7):e0304009. doi: 10.1371/journal.pone.0304009. eCollection 2024.
8
Presenting the COGNIFOG Framework: Architecture, Building Blocks and Road toward Cognitive Connectivity.介绍COGNIFOG框架:架构、构建模块及认知连接之路。
Sensors (Basel). 2024 Aug 15;24(16):5283. doi: 10.3390/s24165283.
9
Blockchain-Based Trust Management Framework for Cloud Computing-Based Internet of Medical Things (IoMT): A Systematic Review.基于区块链的云计算物联网 (IoMT) 信任管理框架:系统评价。
Comput Intell Neurosci. 2022 May 19;2022:9766844. doi: 10.1155/2022/9766844. eCollection 2022.
10
Health-BlockEdge: Blockchain-Edge Framework for Reliable Low-Latency Digital Healthcare Applications.健康区块链边缘:用于可靠低延迟数字医疗保健应用的区块链边缘框架。
Sensors (Basel). 2021 Apr 3;21(7):2502. doi: 10.3390/s21072502.