KEYWORDS: Blockchain, Education and training, Silicon, Telecommunications, Telecommunication networks, Computing systems, Communication and information technologies, Mathematical optimization, Internet, Detection and tracking algorithms
Based on the service-oriented nature that 5G possesses, network slicing can build logical virtual networks in which various services are supplied by a common physical infrastructure. The function of network slicing is decided by the management of multidimensional resources that multi-access edge computing (MEC) offers. This paper presents the optimization of communication and computing resources in blockchain-enabled MEC network slicing. Given its immutability and traceability, blockchain is used to keep records of information concerning resource optimization, including resource information, system utility and slice strategy. The optimization goal of the resource allocation problem is to ensure the quality of service while maximizing the utility gained by the mobile network operator. The optimal resource allocation strategy is obtained using the deep deterministic policy gradient algorithm. The availability of the algorithm is proved through numerical simulations.
KEYWORDS: Blockchain, Data privacy, Data acquisition, Telecommunications, Symmetric-key encryption, Computer security, Network security, Industry, Electronics engineering, Communication and information technologies
In the era of big data, data has gradually become an important asset. In order to fully protect the value of data and ensure the effective conduct of data transactions, this paper combines bulletproof and blockchain to ensure that data transactions can be carried out in a safe and reliable environment, while also hiding the value of data itself. The commitment of bulletproof ensures that all users on the blockchain can verify the validity of the transaction but not the details of the transaction. In this paper, the bulletproof is simulated, and the simulation results verify the feasibility and practicability of the scheme.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.