Tradeoffs In Using Blockchain Technology For Security, Privacy, And Decentralization:theoretical And Empirical Perspectives

Aleksandar Tošić

Abstract


This paper is and extended abstract of the doctoral thesis. It identifies four selected topics in which blockchain technology can have a positive or transformative effect on existing solutions. We propose new protocols, which change the current standards to add functionality, improve performance or overcome limitations of existing blockchain networks. Specifically, we focus on container orchestration on the edge using a unique blockchain protocol for security, verifiability, and trust.

Full Text:

PDF

References


A. Tošić, “Empirična študija uporabe

tehnologije veriženja blokov v obstoječih sistemih in arhitekturah: doktorska disertacija,”Ph.D. dissertation, Univerza na Primorskem, Fakulteta za matematiko, naravoslovje in . . . ,2022.

E. Bayrak, J. Conley, and S. Wilkie, “The economics of cloud computing,” 2011.

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al.,“A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.

W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.

A. Toši ć, J. Vičič, M. Burnard, and M. Mrissa, “A blockchain protocol for real-time application migration on the edge,” Sensors, vol. 23, no. 9, 2023. [Online]. Available: https://www.mdpi.com/1424-8220/23/9/4448

D. Boneh, J. Bonneau, B. B ̈unz, and B. Fisch, “Verifiable delay functions,” in Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Pro-ceedings, Part I. Springer, 2018, pp. 757–788.




DOI: https://doi.org/10.31449/inf.v47i2.4965

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.