Optimized Security for Blockchain Edge-Fog Systems Performance Analysis and Optimization Strategies
Abstrak
The trends of resource consumption and optimization mechanisms for blockchain-enabled security in edge-fog computing environments. While blockchain provides robust security for fog networks in a decentralized fashion, its demand for resources creates tremendous challenge in resource-constrained settings. Through in-depth examination of a Practical Byzantine Fault Tolerance PBFT-based blockchain deployment across 50 edge devices and 10 fog nodes. The study reveals the most critical resource bottlenecks and proposes an adaptive resource management framework that maximizes the tradeoff between security requirements and operational efficiency dynamically. The proposed work shows that data-type-based optimization and intelligent workload distribution can reduce CPU utilization by 27%, memory by 22%, and network bandwidth by 38% without sacrificing security assurance. The introduction of a novel dynamic resource allocation algorithm that adjusts consensus participation and cryptographic strength to current system conditions, demonstrating that security-performance trade-offs can be optimally resolved through context-sensitive optimization. These advancements are a move towards resource-constrained security architectures for edge-fog computing, enabling the broader applicability of blockchain security in resource-poor IoT environments.
Topik & Kata Kunci
Penulis (2)
basman saman
Jolan Rokan Naif
Akses Cepat
- Tahun Terbit
- 2025
- Sumber Database
- DOAJ
- DOI
- 10.25195/ijci.v51i2.610
- Akses
- Open Access ✓