Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2019-06-01

AUTHORS

Saqib Rasool, Muddesar Iqbal, Tasos Dagiuklas, Zia Ul-Qayyum, Shancang Li

ABSTRACT

Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource-constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited resources for the shared computational pool. Credit-based rewarding system is considered as an effective way of incentivizing the arbitrary mobile devices for joining the MAC network and to earn the credits through computational crowdsourcing. The next challenge is to get the reliable computation as incentives attract the malicious devices to submit fake computational results for claiming their reward and we have used the blockchain based reputation system for identifying the malicious participants of MAC. This paper presents a malicious node identification algorithm integrated within the Iroha based permissioned blockchain. Iroha is a project of hyperledger which is focused on mobile devices and thus light-weight in nature. It is used for keeping the track of rewarding and reputation system driven by the malicious node detection algorithm. Experiments are conducted for evaluating the implemented test-bed and results show the effectiveness of algorithm in identifying the malicious devices and conducting reliable data analysis through the blockchain based computational crowdsourcing in MAC. More... »

PAGES

153-163

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s11036-019-01221-x

DOI

http://dx.doi.org/10.1007/s11036-019-01221-x

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1116291250


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Gujrat, Gujrat, Pakistan", 
          "id": "http://www.grid.ac/institutes/grid.440562.1", 
          "name": [
            "University of Gujrat, Gujrat, Pakistan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rasool", 
        "givenName": "Saqib", 
        "id": "sg:person.010716243231.13", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010716243231.13"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "London South Bank University, London, UK", 
          "id": "http://www.grid.ac/institutes/grid.4756.0", 
          "name": [
            "London South Bank University, London, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Iqbal", 
        "givenName": "Muddesar", 
        "id": "sg:person.07364535051.65", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07364535051.65"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "London South Bank University, London, UK", 
          "id": "http://www.grid.ac/institutes/grid.4756.0", 
          "name": [
            "London South Bank University, London, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dagiuklas", 
        "givenName": "Tasos", 
        "id": "sg:person.013724335035.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013724335035.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Gujrat, Gujrat, Pakistan", 
          "id": "http://www.grid.ac/institutes/grid.440562.1", 
          "name": [
            "University of Gujrat, Gujrat, Pakistan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ul-Qayyum", 
        "givenName": "Zia", 
        "id": "sg:person.07572601767.45", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07572601767.45"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of the West of England, Bristol, UK", 
          "id": "http://www.grid.ac/institutes/grid.6518.a", 
          "name": [
            "University of the West of England, Bristol, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Li", 
        "givenName": "Shancang", 
        "id": "sg:person.015235354045.99", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015235354045.99"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1186/2192-113x-2-15", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030704143", 
          "https://doi.org/10.1186/2192-113x-2-15"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-63917-8_5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1100423970", 
          "https://doi.org/10.1007/978-3-319-63917-8_5"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2019-06-01", 
    "datePublishedReg": "2019-06-01", 
    "description": "Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource-constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited resources for the shared computational pool. Credit-based rewarding system is considered as an effective way of incentivizing the arbitrary mobile devices for joining the MAC network and to earn the credits through computational crowdsourcing. The next challenge is to get the reliable computation as incentives attract the malicious devices to submit fake computational results for claiming their reward and we have used the blockchain based reputation system for identifying the malicious participants of MAC. This paper presents a malicious node identification algorithm integrated within the Iroha based permissioned blockchain. Iroha is a project of hyperledger which is focused on mobile devices and thus light-weight in nature. It is used for keeping the track of rewarding and reputation system driven by the malicious node detection algorithm. Experiments are conducted for evaluating the implemented test-bed and results show the effectiveness of algorithm in identifying the malicious devices and conducting reliable data analysis through the blockchain based computational crowdsourcing in MAC.", 
    "genre": "article", 
    "id": "sg:pub.10.1007/s11036-019-01221-x", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1136741", 
        "issn": [
          "1383-469X", 
          "1572-8153"
        ], 
        "name": "Mobile Networks and Applications", 
        "publisher": "Springer Nature", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "1", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "25"
      }
    ], 
    "keywords": [
      "mobile devices", 
      "malicious devices", 
      "reputation systems", 
      "malicious node detection algorithm", 
      "Mobile Ad Hoc Cloud", 
      "resource-constrained edge devices", 
      "reliable data analysis", 
      "Ad Hoc Cloud", 
      "nearby mobile devices", 
      "effectiveness of algorithms", 
      "edge devices", 
      "Mobile Ad", 
      "malicious participants", 
      "computational needs", 
      "MAC networks", 
      "blockchain", 
      "detection algorithm", 
      "data analysis", 
      "algorithm", 
      "reliable computation", 
      "limited resources", 
      "identification algorithm", 
      "computational results", 
      "MAC", 
      "cloud", 
      "rewarding system", 
      "major challenge", 
      "Hyperledger", 
      "Crowdsourcing", 
      "devices", 
      "effective way", 
      "computational", 
      "system", 
      "network", 
      "computation", 
      "challenges", 
      "AD", 
      "next challenge", 
      "resources", 
      "project", 
      "effectiveness", 
      "track", 
      "way", 
      "need", 
      "results", 
      "experiments", 
      "reward", 
      "analysis", 
      "constellation", 
      "nature", 
      "incentives", 
      "rewarding", 
      "credit", 
      "pool", 
      "participants", 
      "paper", 
      "heavy computational needs", 
      "computational pool", 
      "Credit-based rewarding system", 
      "arbitrary mobile devices", 
      "computational crowdsourcing", 
      "fake computational results", 
      "malicious node identification algorithm", 
      "node identification algorithm", 
      "Iroha", 
      "project of hyperledger", 
      "track of rewarding", 
      "node detection algorithm"
    ], 
    "name": "Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud", 
    "pagination": "153-163", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1116291250"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s11036-019-01221-x"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s11036-019-01221-x", 
      "https://app.dimensions.ai/details/publication/pub.1116291250"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2022-01-01T18:51", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_825.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://doi.org/10.1007/s11036-019-01221-x"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11036-019-01221-x'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11036-019-01221-x'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11036-019-01221-x'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11036-019-01221-x'


 

This table displays all metadata directly associated to this object as RDF triples.

168 TRIPLES      22 PREDICATES      95 URIs      85 LITERALS      6 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s11036-019-01221-x schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N7fc70fa397b7447e9e5b1b9ec7aba285
4 schema:citation sg:pub.10.1007/978-3-319-63917-8_5
5 sg:pub.10.1186/2192-113x-2-15
6 schema:datePublished 2019-06-01
7 schema:datePublishedReg 2019-06-01
8 schema:description Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource-constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited resources for the shared computational pool. Credit-based rewarding system is considered as an effective way of incentivizing the arbitrary mobile devices for joining the MAC network and to earn the credits through computational crowdsourcing. The next challenge is to get the reliable computation as incentives attract the malicious devices to submit fake computational results for claiming their reward and we have used the blockchain based reputation system for identifying the malicious participants of MAC. This paper presents a malicious node identification algorithm integrated within the Iroha based permissioned blockchain. Iroha is a project of hyperledger which is focused on mobile devices and thus light-weight in nature. It is used for keeping the track of rewarding and reputation system driven by the malicious node detection algorithm. Experiments are conducted for evaluating the implemented test-bed and results show the effectiveness of algorithm in identifying the malicious devices and conducting reliable data analysis through the blockchain based computational crowdsourcing in MAC.
9 schema:genre article
10 schema:inLanguage en
11 schema:isAccessibleForFree true
12 schema:isPartOf N11063ae9f34645f8b32c68d271da5ff5
13 Nceb759319c0e45089c90c5ec34487833
14 sg:journal.1136741
15 schema:keywords AD
16 Ad Hoc Cloud
17 Credit-based rewarding system
18 Crowdsourcing
19 Hyperledger
20 Iroha
21 MAC
22 MAC networks
23 Mobile Ad
24 Mobile Ad Hoc Cloud
25 algorithm
26 analysis
27 arbitrary mobile devices
28 blockchain
29 challenges
30 cloud
31 computation
32 computational
33 computational crowdsourcing
34 computational needs
35 computational pool
36 computational results
37 constellation
38 credit
39 data analysis
40 detection algorithm
41 devices
42 edge devices
43 effective way
44 effectiveness
45 effectiveness of algorithms
46 experiments
47 fake computational results
48 heavy computational needs
49 identification algorithm
50 incentives
51 limited resources
52 major challenge
53 malicious devices
54 malicious node detection algorithm
55 malicious node identification algorithm
56 malicious participants
57 mobile devices
58 nature
59 nearby mobile devices
60 need
61 network
62 next challenge
63 node detection algorithm
64 node identification algorithm
65 paper
66 participants
67 pool
68 project
69 project of hyperledger
70 reliable computation
71 reliable data analysis
72 reputation systems
73 resource-constrained edge devices
74 resources
75 results
76 reward
77 rewarding
78 rewarding system
79 system
80 track
81 track of rewarding
82 way
83 schema:name Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud
84 schema:pagination 153-163
85 schema:productId N79ac265f415b41ad9c82f03af46b8d07
86 Nb91853a52d0348fb9d2e258cd3f3d13b
87 schema:sameAs https://app.dimensions.ai/details/publication/pub.1116291250
88 https://doi.org/10.1007/s11036-019-01221-x
89 schema:sdDatePublished 2022-01-01T18:51
90 schema:sdLicense https://scigraph.springernature.com/explorer/license/
91 schema:sdPublisher Ndf28461130404966a2315a2a399fd7c1
92 schema:url https://doi.org/10.1007/s11036-019-01221-x
93 sgo:license sg:explorer/license/
94 sgo:sdDataset articles
95 rdf:type schema:ScholarlyArticle
96 N11063ae9f34645f8b32c68d271da5ff5 schema:issueNumber 1
97 rdf:type schema:PublicationIssue
98 N1aec85f0c27a44eea0c2c5617b0edef0 rdf:first sg:person.07364535051.65
99 rdf:rest N805d73c7ecce4fdfb5fc7315f2cc16e1
100 N4631cb52c3c3422baa3c6e0829bd9f17 rdf:first sg:person.07572601767.45
101 rdf:rest N87e6f41e4ab04b7391792e2c881de53c
102 N79ac265f415b41ad9c82f03af46b8d07 schema:name dimensions_id
103 schema:value pub.1116291250
104 rdf:type schema:PropertyValue
105 N7fc70fa397b7447e9e5b1b9ec7aba285 rdf:first sg:person.010716243231.13
106 rdf:rest N1aec85f0c27a44eea0c2c5617b0edef0
107 N805d73c7ecce4fdfb5fc7315f2cc16e1 rdf:first sg:person.013724335035.39
108 rdf:rest N4631cb52c3c3422baa3c6e0829bd9f17
109 N87e6f41e4ab04b7391792e2c881de53c rdf:first sg:person.015235354045.99
110 rdf:rest rdf:nil
111 Nb91853a52d0348fb9d2e258cd3f3d13b schema:name doi
112 schema:value 10.1007/s11036-019-01221-x
113 rdf:type schema:PropertyValue
114 Nceb759319c0e45089c90c5ec34487833 schema:volumeNumber 25
115 rdf:type schema:PublicationVolume
116 Ndf28461130404966a2315a2a399fd7c1 schema:name Springer Nature - SN SciGraph project
117 rdf:type schema:Organization
118 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
119 schema:name Information and Computing Sciences
120 rdf:type schema:DefinedTerm
121 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
122 schema:name Information Systems
123 rdf:type schema:DefinedTerm
124 sg:journal.1136741 schema:issn 1383-469X
125 1572-8153
126 schema:name Mobile Networks and Applications
127 schema:publisher Springer Nature
128 rdf:type schema:Periodical
129 sg:person.010716243231.13 schema:affiliation grid-institutes:grid.440562.1
130 schema:familyName Rasool
131 schema:givenName Saqib
132 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010716243231.13
133 rdf:type schema:Person
134 sg:person.013724335035.39 schema:affiliation grid-institutes:grid.4756.0
135 schema:familyName Dagiuklas
136 schema:givenName Tasos
137 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013724335035.39
138 rdf:type schema:Person
139 sg:person.015235354045.99 schema:affiliation grid-institutes:grid.6518.a
140 schema:familyName Li
141 schema:givenName Shancang
142 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015235354045.99
143 rdf:type schema:Person
144 sg:person.07364535051.65 schema:affiliation grid-institutes:grid.4756.0
145 schema:familyName Iqbal
146 schema:givenName Muddesar
147 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07364535051.65
148 rdf:type schema:Person
149 sg:person.07572601767.45 schema:affiliation grid-institutes:grid.440562.1
150 schema:familyName Ul-Qayyum
151 schema:givenName Zia
152 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07572601767.45
153 rdf:type schema:Person
154 sg:pub.10.1007/978-3-319-63917-8_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1100423970
155 https://doi.org/10.1007/978-3-319-63917-8_5
156 rdf:type schema:CreativeWork
157 sg:pub.10.1186/2192-113x-2-15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030704143
158 https://doi.org/10.1186/2192-113x-2-15
159 rdf:type schema:CreativeWork
160 grid-institutes:grid.440562.1 schema:alternateName University of Gujrat, Gujrat, Pakistan
161 schema:name University of Gujrat, Gujrat, Pakistan
162 rdf:type schema:Organization
163 grid-institutes:grid.4756.0 schema:alternateName London South Bank University, London, UK
164 schema:name London South Bank University, London, UK
165 rdf:type schema:Organization
166 grid-institutes:grid.6518.a schema:alternateName University of the West of England, Bristol, UK
167 schema:name University of the West of England, Bristol, UK
168 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...