{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:54:58Z","timestamp":1760147698933,"version":"build-2065373602"},"reference-count":29,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Vellore Institute of Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Edge computing has its application in a lot of areas now, but with the increasing popularity and benefits, it suffers from some challenges such as data privacy and security. Intruder attacks should be prevented and only authentic users should have access to data storage. Most of the authentication techniques apply some trusted entity to undergo the process. Users and servers both have to be registered in the trusted entity to get permission of authenticating other users. In this scenario, the entire system depends on a single trusted entity; so, a single point of failure can cause the failure of the total system, and scalability issues are there also. To address these issues remaining in the existing systems, in this paper, a decentralized approach has been discussed which is capable of eliminating the concept of a single trusted entity by introducing a blockchain paradigm in edge computing where every time a user or server wants to enter the system, it does not have to register itself manually, but the authentication process is carried out throughout the scheme automatically. Experimental results and performance analysis prove that the proposed architecture is definitely beneficial and it outperforms the existing ones in the concerned domain.<\/jats:p>","DOI":"10.3390\/s23052502","type":"journal-article","created":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T02:03:26Z","timestamp":1677204206000},"page":"2502","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["BlockEdge: A Privacy-Aware Secured Edge Computing Framework Using Blockchain for Industry 4.0"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7194-6950","authenticated-orcid":false,"given":"Deepsubhra","family":"Guha Roy","sequence":"first","affiliation":[{"name":"Department of Internet of Things, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.jpdc.2020.08.012","article-title":"Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid","volume":"147","author":"Guan","year":"2018","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2020.04.004","article-title":"BTNC: A blockchain based trusted network connection protocol in IoT","volume":"143","author":"Zhang","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.jpdc.2020.05.005","article-title":"BPS: A reliable and efficient pub\/sub communication model with blockchain-enhanced paradigm in multi-tenant edge cloud","volume":"143","author":"Huang","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.jpdc.2020.06.008","article-title":"Lightweight collaborative anomaly detection for the IoT using blockchain","volume":"145","author":"Mirsky","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.future.2016.09.009","article-title":"Provably secure authenticated key agreement scheme for distributed mobile cloud computing services","volume":"68","author":"Odelu","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"4650","DOI":"10.1002\/sec.1655","article-title":"A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments","volume":"9","author":"Amin","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","article-title":"Data security and privacy-preserving in edge computing paradigm: Survey and open issues","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_8","unstructured":"Maroufi, M., Abdolee, R., and Tazekand, B.M. (2019). On the convergence of blockchain and Internet of Things (IoT) technologies. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.adhoc.2014.11.018","article-title":"User authentication schemes for wireless sensor networks: A review","volume":"27","author":"Kumari","year":"2015","journal-title":"JAD Hoc. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/COMST.2020.2969706","article-title":"A survey of distributed consensus protocols for blockchain networks","volume":"22","author":"Xiao","year":"2020","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/TMC.2013.134","article-title":"Efficient privacy-preserving authentication in wireless mobile networks","volume":"13","author":"Jo","year":"2013","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1108\/17427371211283029","article-title":"Towards mobile cloud applications: Offloading Resource-Intensive Tasks To Hybrid Clouds","volume":"8","author":"Flores","year":"2012","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.comcom.2022.05.005","article-title":"CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach","volume":"191","author":"Shahryari","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jnca.2019.06.014","article-title":"QoS-aware secure transaction framework for internet of things using blockchain mechanism","volume":"144","author":"Roy","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_16","first-page":"75","article-title":"Clustering Method of Mobile Cloud Computing According to Technical Characteristics of Cloudlets","volume":"14","author":"Alakberov","year":"2022","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"ref_17","first-page":"517","article-title":"Service aware resource management into cloudlets for data offloading towards IoT","volume":"28","author":"Roy","year":"2019","journal-title":"Microsyst. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/2677046.2677052","article-title":"Finding your way in the fog: Towards a comprehensive definition of fog computing","volume":"44","author":"Vaquero","year":"2014","journal-title":"ACM Sigcomm Comput. Commun. Rev."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., and Addepalli, S.L. (2012, January 17). Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland.","DOI":"10.1145\/2342509.2342513"},{"key":"ref_20","unstructured":"Beck, M.T., and Maier, M.L. (2014;, January 24\u201328). Mobile edge computing: Challenges for future virtual network embedding algorithms. Proceedings of the Eighth International Conference on Advanced Engineering Computing and Applications in Sciences (ADVCOMP 2014), Rome, Italy."},{"key":"ref_21","first-page":"1","article-title":"Mobile edge computing\u2014A key technology towards 5G","volume":"11","author":"Hu","year":"2015","journal-title":"Etsi White Pap."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.future.2020.07.009","article-title":"DecChain: A decentralized security approach in Edge Computing based on Blockchain","volume":"113","author":"Bonnah","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1109\/ACCESS.2017.2775042","article-title":"An introduction to dew computing: Definition, concept and implications","volume":"6","author":"Ray","year":"2017","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"529","DOI":"10.3233\/JCS-2007-15503","article-title":"Privacy preserving multi-factor authentication with biometrics","volume":"15","author":"Squicciarini","year":"2007","journal-title":"J. Comput. Secur."},{"key":"ref_25","unstructured":"Lynn, B. (2006). PBC Library Manual 0.5. 11, Stanford University."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Hang, L., and Kim, D.H. (2019). Design and implementation of an integrated iot blockchain platform for sensing data integrity. Sensors Multidiscip. Digit. Publ. Inst., 19.","DOI":"10.3390\/s19102228"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., and Jurdak, R. (2007, January 18\u201321). Towards an optimized blockchain for iot. Proceedings of the 2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, USA.","DOI":"10.1145\/3054977.3055003"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MC.2017.3571049","article-title":"Indie fog: An efficient fog-computing infrastructure for the internet of things","volume":"9","author":"Chang","year":"2017","journal-title":"Comput. IEEE"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/MCOM.2018.1700364","article-title":"Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems","volume":"56","author":"Luo","year":"2018","journal-title":"IEEE Commun. Mag."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/5\/2502\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:41:00Z","timestamp":1760121660000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/5\/2502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["s23052502"],"URL":"https:\/\/doi.org\/10.3390\/s23052502","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,2,23]]}}}