Visible to the public Trustworthy Orchestration of Container Based Edge Computing Using Permissioned Blockchain

TitleTrustworthy Orchestration of Container Based Edge Computing Using Permissioned Blockchain
Publication TypeConference Paper
Year of Publication2018
AuthorsIoini, N. E., Pahl, C.
Conference Name2018 Fifth International Conference on Internet of Things: Systems, Management and Security
ISBN Number978-1-5386-9585-2
Keywordsaccountability, blockchain, blockchain container based architecture, business network, cloud computing, cloud resources, composability, Computer architecture, container based edge computing, Containers, context dependent data analysis, cyber physical systems, Data analysis, decentralized interaction model, EC infrastructures, edge computing, Internet of Things, Internet of Things devices, IoT based applications, IoT devices, Metrics, network accountability, open systems, Peer-to-peer computing, permissioned blockchain, Provenance, pubcrawl, resilience, Resiliency, smart contracts, Stakeholders, Trusted Computing, trustworthy orchestration, Trustworthy Systems, trustworthy transactions, velocity, verity, volume, W3C-PROV data model

The need to process the verity, volume and velocity of data generated by today's Internet of Things (IoT) devices has pushed both academia and the industry to investigate new architectural alternatives to support the new challenges. As a result, Edge Computing (EC) has emerged to address these issues, by placing part of the cloud resources (e.g., computation, storage, logic) closer to the edge of the network, which allows faster and context dependent data analysis and storage. However, as EC infrastructures grow, different providers who do not necessarily trust each other need to collaborate in order serve different IoT devices. In this context, EC infrastructures, IoT devices and the data transiting the network all need to be subject to identity and provenance checks, in order to increase trust and accountability. Each device/data in the network needs to be identified and the provenance of its actions needs to be tracked. In this paper, we propose a blockchain container based architecture that implements the W3C-PROV Data Model, to track identities and provenance of all orchestration decisions of a business network. This architecture provides new forms of interaction between the different stakeholders, which supports trustworthy transactions and leads to a new decentralized interaction model for IoT based applications.

Citation Keyioini_trustworthy_2018