Tradeoffs In Using Blockchain Technology For Security, Privacy, And Decentralization:theoretical And Empirical Perspectives

Authors

  • Aleksandar Tošić University of Primorska InnoRenew CoE

DOI:

https://doi.org/10.31449/inf.v47i2.4965

Abstract

This paper is and extended abstract of the doctoral thesis. It identifies four selected topics in which blockchain technology can have a positive or transformative effect on existing solutions. We propose new protocols, which change the current standards to add functionality, improve performance or overcome limitations of existing blockchain networks. Specifically, we focus on container orchestration on the edge using a unique blockchain protocol for security, verifiability, and trust.

References

A. Tošić, “Empirična študija uporabe

tehnologije veriženja blokov v obstoječih sistemih in arhitekturah: doktorska disertacija,”Ph.D. dissertation, Univerza na Primorskem, Fakulteta za matematiko, naravoslovje in . . . ,2022.

E. Bayrak, J. Conley, and S. Wilkie, “The economics of cloud computing,” 2011.

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al.,“A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.

W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.

A. Toši ć, J. Vičič, M. Burnard, and M. Mrissa, “A blockchain protocol for real-time application migration on the edge,” Sensors, vol. 23, no. 9, 2023. [Online]. Available: https://www.mdpi.com/1424-8220/23/9/4448

D. Boneh, J. Bonneau, B. B ̈unz, and B. Fisch, “Verifiable delay functions,” in Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Pro-ceedings, Part I. Springer, 2018, pp. 757–788.

Downloads

Published

2023-06-22

How to Cite

Tošić, A. (2023). Tradeoffs In Using Blockchain Technology For Security, Privacy, And Decentralization:theoretical And Empirical Perspectives. Informatica, 47(2). https://doi.org/10.31449/inf.v47i2.4965

Issue

Section

Thesis summary