What is it about?
Centralized cloud struggles with growing device demands. Edge tech, like mobile edge-clouds, inherits P2P security issues. Trust methods lack balance, leaving service provider nodes vulnerable. This work patches loopholes, enhances fairness, and improves network security, especially for mobile edge-clouds. Tested with BitTorrent protocol and Peersim simulator, it outperforms existing methods.
Featured Image
Why is it important?
Addressing security in the growing realm of edge computing, specifically mobile edge-clouds, is crucial due to rising device demands. Current P2P trust-based methods have shortcomings, and this work seeks to rectify them, bolstering network security and fairness.
Read the Original
This page is a summary of: Reputation-Based Security System For Edge Computing, August 2018, ACM (Association for Computing Machinery),
DOI: 10.1145/3230833.3232819.
You can read the full text:
Contributors
The following have contributed to this page