{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T10:55:54Z","timestamp":1769597754345,"version":"3.49.0"},"reference-count":34,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2019,12,15]],"date-time":"2019-12-15T00:00:00Z","timestamp":1576368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Edge computing is a distributed computing paradigm that encompasses data computing and storage and is performed close to the user, efficiently guaranteeing faster response time. This paradigm plays a pivotal role in the world of the Internet of Things (IoT). Moreover, the concept of the distributed edge cloud raises several interesting open issues, e.g., failure recovery and security. In this paper, we propose a system composed of edge nodes and multiple cloud instances, as well as a voting mechanism. The multi-cloud environment aims to perform centralized computations, and edge nodes behave as a middle layer between edge devices and the cloud. Moreover, we present a voting mechanism that leverages the edge network to validate the performed computation that occurred in the centralized environment.<\/jats:p>","DOI":"10.3390\/fi11120262","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T05:19:38Z","timestamp":1576473578000},"page":"262","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Dependable and Secure Voting Mechanism in Edge Computing"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0780-8216","authenticated-orcid":false,"given":"Pedro A.R.S.","family":"Costa","sequence":"first","affiliation":[{"name":"Copelabs, Informatics Department, Universidade Lus\u00f3fona, Campo Grande 376, 1749-024 Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7315-8739","authenticated-orcid":false,"given":"Marko","family":"Beko","sequence":"additional","affiliation":[{"name":"Copelabs, Informatics Department, Universidade Lus\u00f3fona, Campo Grande 376, 1749-024 Lisbon, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","article-title":"A Survey on Cloud Computing Security","volume":"75","author":"Singh","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Persico, V., Botta, A., Montieri, A., and Pescape, A. (2016, January 4\u20138). A First Look at Public-Cloud Inter-Datacenter Network Performance. Proceedings of the IEEE Global Communications Conference, Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2016.7841498"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge Computing: Vision and Challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_4","unstructured":"Solutions, I. (2019, December 13). IoT Transforming the Future of Agriculture. Available online: https:\/\/www.iotsworldcongress.com\/iot-transforming-the-future-of-agriculture\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.procs.2015.04.006","article-title":"Cloud Computing and Inter-Clouds\u2014Types, Topologies and Research Issues","volume":"50","author":"Rani","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_6","unstructured":"Horwitz, L. (2019, December 13). Can Smart City Infrastructure Alleviate the Strain of City Growth?. Available online: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/internet-of-things\/smart-city-infrastructure.html."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","article-title":"Security and Privacy in Smart City Applications: Challenges and Solutions","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Tang, B., Chen, Z., Hefferman, G., Wei, T., He, H., and Yang, Q. (2015, January 7\u20139). A Hierarchical Distributed Fog Computing Architecture for Big Data Analysis in Smart Cities. Proceedings of the ASE Big Data & Social Informatics 2015, Kaohsiung, Taiwan.","DOI":"10.1145\/2818869.2818898"},{"key":"ref_9","first-page":"47","article-title":"A multi-agent based flexible IoT edge computing architecture and application to ITS","volume":"14","author":"Ogino","year":"2019","journal-title":"Int. J. Netw. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The Byzantine Generals Problem","volume":"4","author":"Lamport","year":"1982","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sousa, J., Bessani, A., and Vukolic, M. (2018, January 25\u201328). A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. Proceedings of the 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Luxembourg.","DOI":"10.1109\/DSN.2018.00018"},{"key":"ref_12","unstructured":"Infosec Institute (2018, August 23). Security Issues in Edge Computing and the IoT. Available online: https:\/\/resources.infosecinstitute.com\/security-issues-in-edge-computing-and-the-iot."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges","volume":"78","author":"Roman","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Meza, J., Wu, Q., Kumar, S., and Mutlu, O. (2015, January 22\u201325). Revisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the Field. Proceedings of the IEEE\/IFIP 45th International Conference on Dependable Systems and Networks, Rio de Janeiro, Brazil.","DOI":"10.1109\/DSN.2015.57"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Nightingale, E.B., Douceur, J.R., and Orgovan, V. (2011, January 10\u201313). Cycles, Cells and Platters: An Empirical Analysisof Hardware Failures on a Million Consumer PCs. Proceedings of the 6th Conference on Computer Systems (EuroSys), Salzburg, Austria.","DOI":"10.1145\/1966445.1966477"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Schroeder, B., Pinheiro, E., and Weber, W.D. (2009, January 15\u201319). DRAM Errors in the Wild: A Large-scale Field Study. Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems, Seattle, WA, USA.","DOI":"10.1145\/1555349.1555372"},{"key":"ref_17","unstructured":"Cloud Security Alliance (2013, February 25). Cloud Security Alliance Warns Providers of \u2018The Notorious Nine\u2019 Cloud Computing Top Threats in 2013. Available online: https:\/\/cloudsecurityalliance.org\/articles\/ca-warns-providers-of-the-notorious-nine-cloud-computing-top-threats-in-2013\/."},{"key":"ref_18","unstructured":"Chen, A. (2019, December 13). GCreep: Google Engineer Stalked Teens, Spied on Chats. Available online: http:\/\/gawker.com\/5637234\/gcreep-google-engineer-stalked-teens-spied-on-chats."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-642-41476-3_8","article-title":"The Insider Threat in Cloud Computing","volume":"Volume 6983","author":"Kandias","year":"2013","journal-title":"Critical Information Infrastructure Security"},{"key":"ref_20","unstructured":"Whittaker, Z. (2019, December 13). It Was a Really Bad Month for the Internet. Available online: https:\/\/techcrunch.com\/2019\/07\/05\/bad-month-for-the-internet\/."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ha, K., Chen, Z., Hu, W., Richter, W., Pillai, P., and Satyanarayanan, M. (2014, January 16\u201319). Towards Wearable Cognitive Assistance. Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, Bretton Woods, NH, USA.","DOI":"10.1145\/2594368.2594383"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Chun, B.G., Ihm, S., Maniatis, P., Naik, M., and Patti, A. (2011, January 10\u201313). CloneCloud: Elastic execution between mobile device and cloud. Proceedings of the Sixth Conference on Computer Systems, Salzburg, Austria.","DOI":"10.1145\/1966445.1966473"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wang, Q., Lee, B., Murray, N., and Qiao, Y. (2018, January 12\u201315). MR-IoT: An information centric MapReduce framework for IoT. Proceedings of the 15th IEEE Annual Consumer Communications Networking Conference, Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2018.8319184"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Javed, A., Heljanko, K., Buda, A., and Fr\u00e4mling, K. (2018, January 5\u20138). CEFIoT: A fault-tolerant IoT architecture for edge and cloud. Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore.","DOI":"10.1109\/WF-IoT.2018.8355149"},{"key":"ref_25","unstructured":"Hao, Z., Yi, S., and Li, Q. (2018, January 10). EdgeCons: Achieving Efficient Consensus in Edge Computing Networks. Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, Boston, MA, USA."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Stanciu, A. (2017, January 29\u201331). Blockchain Based Distributed Control System for Edge Computing. Proceedings of the 21st International Conference on Control Systems and Computer Science, Bucharest, Romania.","DOI":"10.1109\/CSCS.2017.102"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Vukoli\u0107, M. (2015, January 29). The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. Proceedings of the International Workshop on Open Problems in Network Security, Zurich, Switzerland.","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Decker, C., Seidel, J., and Wattenhofer, R. (2016, January 4\u20137). Bitcoin Meets Strong Consistency. Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore.","DOI":"10.1145\/2833312.2833321"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1145\/571637.571640","article-title":"Practical Byzantine Fault Tolerance and Proactive Recovery","volume":"20","author":"Castro","year":"2002","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Kotla, R., Alvisi, L., Dahlin, M., Clement, A., and Wong, E. (2007, January 14\u201317). Zyzzyva: Speculative Byzantine Fault Tolerance. Proceedings of the Twenty-First ACM Symposium on Operating Systems Principles, Stevenson, WA, USA.","DOI":"10.1145\/1294261.1294267"},{"key":"ref_31","unstructured":"Rouse, M. (2019, December 13). Multi-Cloud Strategy. Available online: https:\/\/searchcloudcomputing.techtarget.com\/definition\/multi-cloud-strategy."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCC.2017.3791027","article-title":"On the Design of Resilient Multicloud MapReduce","volume":"4","author":"Costa","year":"2018","journal-title":"IEEE Cloud Comput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/TC.2011.221","article-title":"Efficient Byzantine Fault-Tolerance","volume":"62","author":"Verissimo","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bessani, A., Sousa, J., and Alchieri, E.E.P. (2014, January 23\u201326). State Machine Replication for the Masses with BFT-SMART. Proceedings of the 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, USA.","DOI":"10.1109\/DSN.2014.43"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/11\/12\/262\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:42:34Z","timestamp":1760190154000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/11\/12\/262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,15]]},"references-count":34,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["fi11120262"],"URL":"https:\/\/doi.org\/10.3390\/fi11120262","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,15]]}}}