scholarly journals A Blockchain-Based Microgrid Data Disaster Backup Scheme in Edge Computing

2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Lihua Zhang ◽  
Yu Cao ◽  
Ganzhe Zhang ◽  
Yang Huang ◽  
Chen Zheng

In view of the problems of low security, poor reliability, inability to backup automatically, and overreliance on the third party in traditional microgrid data disaster backup schemes based on cloud backup, the edge computing is used to preprocess power big data, and a microgrid data disaster backup scheme based on blockchain in edge computing environment is proposed in this paper. First, the honey encryption (HE) technology and advanced encryption standard (AES) are combined to propose a new encryption algorithm HE-AES, which is used to encrypt the preprocessed data. Second, the Kademlia algorithm is embedded in the edge server to realize the distributed storage and automatic recovery of microgrid data. Finally, the traditional proof of authority (PoA) consensus mechanism is improved partially, and the improved PoA is used to make each node reach consensus and pack blocks on the chain. The scheme can not only realize the data disaster backup automatically but also has high efficiency of data processing, which can provide a new idea for improving the current data disaster backup schemes.

Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 502
Author(s):  
Wenping Kong ◽  
Xiaoyong Li ◽  
Liyang Hou ◽  
Yanrong Li

With the development of 5G, user terminal computing moves up and cloud computing sinks, thus forming a computing fusion at the edge. Edge computing with high-efficiency, real-time, and fast features will become part of 5G construction. Utilizing distributed computing and storage resources at the edge of the network to perform distributed data processing tasks can alleviate the load on the cloud computing center, which is also the development trend of edge computing. When a malicious node exists, the error information feedback by the node will affect the result of local perception decision. To solve the problem of malicious behavior of the node, a node trust evaluation mechanism of interactive behavior is introduced. The trust mechanism for edge computing network environments is introduced as a novel security solution. First, the key thought of the trust mechanism proposed in this paper is to establish a trust relationship between edge nodes in open edge computing environment. Then, a multi-source trust fusion algorithm based on time decay aggregates direct interaction trust and different third-party recommendation trust to calculate the global trust of the evaluated nodes. Finally, simulation experiments show that the algorithm has a certain degree of improvement in computational efficiency and interaction success rate over other existing models, which reduces the situation of malicious node deception.


2020 ◽  
Vol 34 (06) ◽  
pp. 2050083
Author(s):  
Yi-Hua Zhou ◽  
Jing Zhang ◽  
Wei-Min Shi ◽  
Yu-Guang Yang ◽  
Mao-Feng Wang

General quantum key agreement (QKA) protocols require each participant to make the same contribution to the generation of a shared key, but this situation cannot meet the needs of government or military which require a third party only to control key agreement process. This paper proposed a continuous-variable quantum key agreement (CVQKA) protocol with multi-party Greenberg–Horne–Zeilinger (GHZ) entangled states generated by a third party. The third party prepares quantum states by sending multi-photon beam with higher emission frequency and stronger signal. Taking continuous variable as carrier, the information carried by each carrier increases, which improves the security key rate. In this paper, the third party controls but does not contribute to the final key. After receiving the states, each participant encodes his or her own key, adds a decoy state and sends it to the next participant, until receiving the quantum state that was encoded by all the participants. Then, participants can measure and calculate to get the final shared key. It shows that our protocol is easy to implement and has high efficiency. Security analysis shows that our protocol can resist collusion attacks, beam splitter attack, etc.


2014 ◽  
Author(s):  
Jaclyn M. Moloney ◽  
Chelsea A. Reid ◽  
Jody L. Davis ◽  
Jeni L. Burnette ◽  
Jeffrey D. Green

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Author(s):  
Moeed Yusuf

This book is the first to theorize third party mediation in crises between regional nuclear powers. Its relevance flows from two of the most significant international developments since the end of the Cold War: the emergence of regional nuclear rivalries; and the shift from the Cold War’s bipolar context to today’s unipolar international setting. Moving away from the traditional bilateral deterrence models, the book conceptualizes crisis behavior as “brokered bargaining”: a three-way bargaining framework where the regional rivals and the ‘third party’ seek to influence each other to behave in line with their crisis objectives and in so doing, affect each other’s crisis behavior. The book tests brokered bargaining theory by examining U.S.-led crisis management in South Asia, analyzing three major crises between India and Pakistan: the Kargil conflict, 1999; the 2001-02 nuclear standoff; and the Mumbai crisis, 2008. The case studies find strong evidence of behavior predicted by the brokered bargaining framework. They also shed light on several risks of misperceptions and inadvertence due to the challenges inherent in signaling to multiple audiences simultaneously. Traditional explanations rooted in bilateral deterrence models do not account for these, leaving a void with serious practical consequences, which the introduction of brokered bargaining seeks to fill. The book’s findings also offer lessons for crises on the Korean peninsula, between China and India, and between potential nuclear rivals in the Middle East.


Author(s):  
Chen Lei

This chapter examines the position of third party beneficiaries in Chinese law. Article 64 of the Chinese Contract Law states that where a contract for the benefit of a third party is breached, the debtor is liable to the creditor. The author regards this as leaving unanswered the question of whether the thirdparty has a right of direct action against the debtor. One view regards the third party as having the right to sue for the benefit although this right was ultimately excluded from the law. Another view, supported by the Supreme People’s Court, is that Article 64 does not provide a right of action for a third party and merely prescribes performance in ‘incidental’ third party contracts. The third view is that there is a third party right of action in cases of ‘genuine’ third party contracts but courts are unlikely to recognize a third party action where the contract merely purports to confer a benefit on the third party.


Author(s):  
Ly Tayseng

This chapter gives an overview of the law on contract formation and third party beneficiaries in Cambodia. Much of the discussion is tentative since the new Cambodian Civil Code only entered into force from 21 December 2011 and there is little case law and academic writing fleshing out its provisions. The Code owes much to the Japanese Civil Code of 1898 and, like the latter, does not have a requirement of consideration and seldom imposes formal requirements but there are a few statutory exceptions from the principle of freedom from form. For a binding contract, the agreement of the parties is required and the offer must be made with the intention to create a legally binding obligation and becomes effective once it reaches the offeree. The new Code explicitly provides that the parties to the contract may agree to confer a right arising under the contract upon a third party. This right accrues directly from their agreement; it is not required that the third party declare its intention to accept the right.


Sign in / Sign up

Export Citation Format

Share Document