Authors
Yeghisabet Alaverdyan1,2, Suren Poghosyan2 and Vahagn Poghosyans2,3, 1EKENG CJSC, Armenia, 2Institute for Informatics and Automation Problems of NAS RA, Armenia, 3Synopsys, Armenia
Abstract
"The paper introduces certain timely and secure computing approaches that affect data intelligence related to methods and tools for real-time information processing. Timely solutions are achieved using local premises rather than supporting centralized servers or clouds. Computing within the network partly occurs near the physical endpoints, and this is where the edge computing paradigm comes in to help. The proposed method of the cloud optimization suggests splitting and sharing data between network data centers and local computing power. Provision of distinct paths between edge and main cloud for each smart device is achieved using separate blockchain which register and store the logical links of hierarchical data. Methods for cryptographic key splitting between the edge and the main cloud, as well as strong authentication ensuring the shared data confidentiality, integrity, availability, and consistency are also given.
Keywords
Edge computing, key splitting, authentication, blockchain, data sharing, data intelligence