SlideShare a Scribd company logo
Presented by
NamYong Kim
nykim@seoultech.ac.kr
1. Introduction
2. Related Works
3. Blockchain-based Multiple AAA System
in Edge Computing for IoT Networks
4. Conclusion
• Recently, cloud service has become an essential environment for mobile
and PC users for convenient life.
• Fog computing and edge computing have excellent location awareness
in fog node, edge related technologies, and are more hierarchical than
traditional cloud.
• The overall market trend is being replaced by edge computing in
existing cloud computing in response to consumer and market changes.
• In the Gartner Top 10 Strategic Technology Trends for 2018, edge and
blockchain in the cloud was selected a key components of the ten key
technologies in the future.
• In current enterprise centralized data center or the cloud from outside
the data of about 10% it is generated and processed. By 2022, Gartner
is expected to see a 50% increase in figures.
1. Introduction
• Large-scale edge computing is essential to security authentication, authorization, and
account management because it is anxious to use if personal information leakage,
various hacking and cyber terrorism occur.
• we have had interesting research themes that apply blockchain of bit coin
technology while considering the ways to have enhanced access control security.
• When applied to a distributed cloud using a blockchain of interest, the distributed
cloud can provide an alternative to the problems that arise from the centralized
cloud architecture.
• Recently, a distributed network can connect each independent node through a
blockchain technique applied to various fields.
• Thus, the distributed cloud shows the Authentication, Authorization, and Accounting
(AAA) system in a distributed manner by connecting each block to an independent
node.
• There are several papers on the security of the authentication system, but there are
few studies on the blockchain and it is necessary to study multiple AAA systems.
1. Introduction
2. Related Works
2.1. Core technology
Edge Computing: Edge computing handles information processing,
content collection and transmission, closer to IoT and machines, and
supports computing on devices located at the edge of the network.
Blockchain: Blockchain is a next-generation transactional application
technology that sets the reliability, transparency, and accountability while
streamlining complex processes.
Authentication, Authorization, Accounting (AAA): Authentication verifies the
user's identity before allowing access to the system. Authorization allows a
level of authority and service to a verified user. Accounting collects usage
information about users' resources and provides billing, auditing, capacity
increase, and reporting.
2. Related Works
MFA is a method of user login authentication through two or more
products or elements. Such authentication requires two or more
authentication methods, including Fast Identity Online (FIDO)
authentication.
The MCA uses different independent channels such as web, mobile and IoT
channels to transmit. The transmission procedure does not include
personal information in the communications section.
2. Related Works
2.2. Required design principles for multiple AAA system
A secure and efficient network environment is need to solve current and future
problems and meet new service requirements. Existing systems rely on evidence
from a single source of information, such as fingerprint, face recognition, and iris
recognition, required for existing authentication. Moreover, we have to solve
various problems such as noise of detected data, similarity in class, and similarity.
• Scalability: When designing an authentication system for future extended IoT
networks, it is necessary to adapt to local conditions first.
• Resilience: Multiple AAA systems using blockchain require various nodes.
Blockchain nodes run continuously, and even if some nodes fail to compute,
autonomous recovery is possible by providing improved resiliency through
operations on subsequent nodes.
• Security: Data between IoT networks and service providers is a design principle
that security integrity and personal information are the most important.
3. PROPOSED MULTIPLE AAA SYSTEM
In an existing cloud environment, various IoT devices are rapidly increasing,
requiring safe and fast data processing. For the safety of numerous data
transmissions, the authentication process includes MFA and MCA, and discusses the
application of various AAA systems on a blockchain basis.
3.1. Blockchain-based Multiple AAA System in Edge Computing for IoT
Networks model
Figure 1 depicts a multiple AAA system model as a whole in Edge computing,
which is classified as a cloud layer, a fog layer, and a device layer.
The cloud includes a variety of service models and can provide all sorts of apps
that are included in the service. The fog layer consists of innumerable fog nodes,
and the fog node is the core of the blockchain-based multiple AAA system. The
blockchain guarantees safety and reliability by connecting the fog nodes together,
and is efficient because there is no need for a trusted authority like the central
cloud. The device layer represents a collection of various IoT devices.
3. PROPOSED MULTIPLE AAA SYSTEM
The verification maintains the
updated flow rule table in its own
database and represents the
controller of the blockchain
network.
The request and response is an
IoT delivery device that updates
the flow rule table of the
blockchain network.
Authentication and requests are
formed into a blockchain-based
multiple AAA system through the
connection of such networks.
Fig. 1. Blockchain-based Multiple AAA System in Edge Computing for
IoT Networks model
3. PROPOSED MULTIPLE AAA SYSTEM
3.2. Service scenario
In the blockchain-based AAA system in Edge Computing, authentication shown
through an optional authentication method, a blockchain-based authentication
system based on various environments, and various services.
In a blockchain-based authentication cloud, a variety of FIDO authentication and
WAS servers, DBMSs, and push servers can be included. Web sites that require
authentication can authenticated using an integrated authentication service. The
blockchain-based AAA system expected to use in various fields such as banking
and SNS authentication services.
Fig. 2. Service scenario for the proposed multiple AAA system
3. PROPOSED MULTIPLE AAA SYSTEM
1. User requests authentication for IoT Networks.
2. Authentication request between servers for blockchain-based AAA system.
3. Communication sent from push server for second authentication.
4. Verification and authentication key transmission through second authentication.
5. Authentication request and confirmation between servers for blockhain-based
multiple AAA system.
6. Verification and completion of reliability in request of authenticated key for
blockhain-based multiple AAA system
7. Secure data transmission through complete authentication.
4. CONCLUSIONS
IoT networks require security authentication, authorization and account
management elements because they are unstable to use if hacking and cyber
terrorism occur. Therefore, in the related work, we discussed the importance and
core technology of blockchain and authentication, authorization, and account
management in edge computing. We construct a system that meets the necessary
design principles of multiple AAA system.
We propose a system that improves security through authentication, authorization,
account management and blockchain of IoT network. Proposed paper discuss the
configuration of the proposed system based on the discussion and study
blockchain-based multiple AAA system environment and service scenario in edge
computing.
Q & A
13

More Related Content

PDF
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
PDF
Clsb 2020 cfp
PDF
Call for Papers - International Conference on Big Data, Blockchain and Securi...
PDF
International Conference on Big Data, Blockchain and Security (BDBS 2020)
PPTX
Trends of blockchain in 2019
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
PDF
The Weakest Point of Security in IoT
PPTX
Encryption Algorithms for Cloud
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
Clsb 2020 cfp
Call for Papers - International Conference on Big Data, Blockchain and Securi...
International Conference on Big Data, Blockchain and Security (BDBS 2020)
Trends of blockchain in 2019
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
The Weakest Point of Security in IoT
Encryption Algorithms for Cloud

What's hot (20)

PDF
CWIN17 Singapore / Kalyan madala ibm
PDF
Call for Papers - 9th International Conference of Security, Privacy and Trust...
PDF
10 technology trends that will shape security industry 2018
PDF
IoT on Blockchain Solution Overview
PDF
9th International Conference of Security, Privacy and Trust Management (SPTM ...
PPTX
IoT, Fog Computing and the Blockchain
PPTX
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
PDF
Blockchain Technology In IOT
PDF
Project 3
PDF
Mieterstrom, IoT & Blockchain (EN)
PDF
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
PDF
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
PDF
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
PPTX
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
PDF
Fog computing security and privacy issues, open challenges, and blockchain so...
PDF
IT Security News & Case Studies
PPTX
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
PPTX
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
PDF
Build Secure IoT Solutions Using... Blockchain - Geeta Chauhan
PPTX
Trend business overview 2014
CWIN17 Singapore / Kalyan madala ibm
Call for Papers - 9th International Conference of Security, Privacy and Trust...
10 technology trends that will shape security industry 2018
IoT on Blockchain Solution Overview
9th International Conference of Security, Privacy and Trust Management (SPTM ...
IoT, Fog Computing and the Blockchain
CWIN17 Frankfurt / ibm_watson_io_t_platform_and_blockchain_v4
Blockchain Technology In IOT
Project 3
Mieterstrom, IoT & Blockchain (EN)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
Fog computing security and privacy issues, open challenges, and blockchain so...
IT Security News & Case Studies
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
Build Secure IoT Solutions Using... Blockchain - Geeta Chauhan
Trend business overview 2014
Ad

Similar to Blockchain-based multiple AAA system in edge computing for IoT networks (20)

PPTX
Hybrid black chain based on authentication identified scheme for WSN
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
PPTX
Securing edge lot systems
PPTX
Cascon Decentralized IoT update - Blockchain and Smart Contracts
PDF
final.pdf
PPTX
Internet of Things and Edge Compute at Chick-fil-A
PPTX
IoT and Blockchain Convergence
PDF
Smart offload chain: a proposed architecture for blockchain assisted fog off...
PPTX
IWCI21: Distributed Ledgers for Distributed Edge
PDF
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
PPTX
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PDF
Cooperative hierarchical based edge-computing approach for resources allocati...
PPTX
220943-RSP.pptx
PDF
A_Cooperative_PoW_and_Incentive_Mechanism_for_Blockchain_in_Edge_Computing.pdf
PDF
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
PDF
International Journal of Mobile Network Communications & Telematics ( IJMNCT)
PDF
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...
PDF
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...
PDF
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Hybrid black chain based on authentication identified scheme for WSN
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
Securing edge lot systems
Cascon Decentralized IoT update - Blockchain and Smart Contracts
final.pdf
Internet of Things and Edge Compute at Chick-fil-A
IoT and Blockchain Convergence
Smart offload chain: a proposed architecture for blockchain assisted fog off...
IWCI21: Distributed Ledgers for Distributed Edge
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
Cooperative hierarchical based edge-computing approach for resources allocati...
220943-RSP.pptx
A_Cooperative_PoW_and_Incentive_Mechanism_for_Blockchain_in_Edge_Computing.pdf
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
International Journal of Mobile Network Communications & Telematics ( IJMNCT)
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Ad

More from Nam Yong Kim (9)

PPTX
Hybrid Virtual Machine-based SDN System in Cloud
PPTX
Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...
PPT
Specific innovative semi-transparent solar cell for indoor and outdoor LiFi a...
PDF
효율적인 클라우드 환경을 위한 가상화 및 SDN/NFV 기술 연구
PDF
Algorithm (MAC/GCM/GMAC)
PDF
A secure system for pervasive social network based healthcare
PDF
Chap06 block cipher operation
PDF
Cloud tech or SecaaS
PDF
ZodiacWX_Northbound Networks manual1
Hybrid Virtual Machine-based SDN System in Cloud
Novel user allocation scheme for full duplex multi-user bidirectional Li-Fi n...
Specific innovative semi-transparent solar cell for indoor and outdoor LiFi a...
효율적인 클라우드 환경을 위한 가상화 및 SDN/NFV 기술 연구
Algorithm (MAC/GCM/GMAC)
A secure system for pervasive social network based healthcare
Chap06 block cipher operation
Cloud tech or SecaaS
ZodiacWX_Northbound Networks manual1

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx

Blockchain-based multiple AAA system in edge computing for IoT networks

  • 2. 1. Introduction 2. Related Works 3. Blockchain-based Multiple AAA System in Edge Computing for IoT Networks 4. Conclusion
  • 3. • Recently, cloud service has become an essential environment for mobile and PC users for convenient life. • Fog computing and edge computing have excellent location awareness in fog node, edge related technologies, and are more hierarchical than traditional cloud. • The overall market trend is being replaced by edge computing in existing cloud computing in response to consumer and market changes. • In the Gartner Top 10 Strategic Technology Trends for 2018, edge and blockchain in the cloud was selected a key components of the ten key technologies in the future. • In current enterprise centralized data center or the cloud from outside the data of about 10% it is generated and processed. By 2022, Gartner is expected to see a 50% increase in figures. 1. Introduction
  • 4. • Large-scale edge computing is essential to security authentication, authorization, and account management because it is anxious to use if personal information leakage, various hacking and cyber terrorism occur. • we have had interesting research themes that apply blockchain of bit coin technology while considering the ways to have enhanced access control security. • When applied to a distributed cloud using a blockchain of interest, the distributed cloud can provide an alternative to the problems that arise from the centralized cloud architecture. • Recently, a distributed network can connect each independent node through a blockchain technique applied to various fields. • Thus, the distributed cloud shows the Authentication, Authorization, and Accounting (AAA) system in a distributed manner by connecting each block to an independent node. • There are several papers on the security of the authentication system, but there are few studies on the blockchain and it is necessary to study multiple AAA systems. 1. Introduction
  • 5. 2. Related Works 2.1. Core technology Edge Computing: Edge computing handles information processing, content collection and transmission, closer to IoT and machines, and supports computing on devices located at the edge of the network. Blockchain: Blockchain is a next-generation transactional application technology that sets the reliability, transparency, and accountability while streamlining complex processes. Authentication, Authorization, Accounting (AAA): Authentication verifies the user's identity before allowing access to the system. Authorization allows a level of authority and service to a verified user. Accounting collects usage information about users' resources and provides billing, auditing, capacity increase, and reporting.
  • 6. 2. Related Works MFA is a method of user login authentication through two or more products or elements. Such authentication requires two or more authentication methods, including Fast Identity Online (FIDO) authentication. The MCA uses different independent channels such as web, mobile and IoT channels to transmit. The transmission procedure does not include personal information in the communications section.
  • 7. 2. Related Works 2.2. Required design principles for multiple AAA system A secure and efficient network environment is need to solve current and future problems and meet new service requirements. Existing systems rely on evidence from a single source of information, such as fingerprint, face recognition, and iris recognition, required for existing authentication. Moreover, we have to solve various problems such as noise of detected data, similarity in class, and similarity. • Scalability: When designing an authentication system for future extended IoT networks, it is necessary to adapt to local conditions first. • Resilience: Multiple AAA systems using blockchain require various nodes. Blockchain nodes run continuously, and even if some nodes fail to compute, autonomous recovery is possible by providing improved resiliency through operations on subsequent nodes. • Security: Data between IoT networks and service providers is a design principle that security integrity and personal information are the most important.
  • 8. 3. PROPOSED MULTIPLE AAA SYSTEM In an existing cloud environment, various IoT devices are rapidly increasing, requiring safe and fast data processing. For the safety of numerous data transmissions, the authentication process includes MFA and MCA, and discusses the application of various AAA systems on a blockchain basis. 3.1. Blockchain-based Multiple AAA System in Edge Computing for IoT Networks model Figure 1 depicts a multiple AAA system model as a whole in Edge computing, which is classified as a cloud layer, a fog layer, and a device layer. The cloud includes a variety of service models and can provide all sorts of apps that are included in the service. The fog layer consists of innumerable fog nodes, and the fog node is the core of the blockchain-based multiple AAA system. The blockchain guarantees safety and reliability by connecting the fog nodes together, and is efficient because there is no need for a trusted authority like the central cloud. The device layer represents a collection of various IoT devices.
  • 9. 3. PROPOSED MULTIPLE AAA SYSTEM The verification maintains the updated flow rule table in its own database and represents the controller of the blockchain network. The request and response is an IoT delivery device that updates the flow rule table of the blockchain network. Authentication and requests are formed into a blockchain-based multiple AAA system through the connection of such networks. Fig. 1. Blockchain-based Multiple AAA System in Edge Computing for IoT Networks model
  • 10. 3. PROPOSED MULTIPLE AAA SYSTEM 3.2. Service scenario In the blockchain-based AAA system in Edge Computing, authentication shown through an optional authentication method, a blockchain-based authentication system based on various environments, and various services. In a blockchain-based authentication cloud, a variety of FIDO authentication and WAS servers, DBMSs, and push servers can be included. Web sites that require authentication can authenticated using an integrated authentication service. The blockchain-based AAA system expected to use in various fields such as banking and SNS authentication services. Fig. 2. Service scenario for the proposed multiple AAA system
  • 11. 3. PROPOSED MULTIPLE AAA SYSTEM 1. User requests authentication for IoT Networks. 2. Authentication request between servers for blockchain-based AAA system. 3. Communication sent from push server for second authentication. 4. Verification and authentication key transmission through second authentication. 5. Authentication request and confirmation between servers for blockhain-based multiple AAA system. 6. Verification and completion of reliability in request of authenticated key for blockhain-based multiple AAA system 7. Secure data transmission through complete authentication.
  • 12. 4. CONCLUSIONS IoT networks require security authentication, authorization and account management elements because they are unstable to use if hacking and cyber terrorism occur. Therefore, in the related work, we discussed the importance and core technology of blockchain and authentication, authorization, and account management in edge computing. We construct a system that meets the necessary design principles of multiple AAA system. We propose a system that improves security through authentication, authorization, account management and blockchain of IoT network. Proposed paper discuss the configuration of the proposed system based on the discussion and study blockchain-based multiple AAA system environment and service scenario in edge computing.