What is it about?

Centralized cloud struggles with growing device demands. Edge tech, like mobile edge-clouds, inherits P2P security issues. Trust methods lack balance, leaving service provider nodes vulnerable. This work patches loopholes, enhances fairness, and improves network security, especially for mobile edge-clouds. Tested with BitTorrent protocol and Peersim simulator, it outperforms existing methods.

Featured Image

Why is it important?

Addressing security in the growing realm of edge computing, specifically mobile edge-clouds, is crucial due to rising device demands. Current P2P trust-based methods have shortcomings, and this work seeks to rectify them, bolstering network security and fairness.

Read the Original

This page is a summary of: Reputation-Based Security System For Edge Computing, August 2018, ACM (Association for Computing Machinery),
DOI: 10.1145/3230833.3232819.
You can read the full text:

Read

Contributors

The following have contributed to this page