Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework

Version 1 : Received: 3 June 2024 / Approved: 4 June 2024 / Online: 5 June 2024 (07:26:29 CEST)

How to cite: Alwakeel, A. M.; Alnaim, A. Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework. Preprints 2024, 2024060210. https://doi.org/10.20944/preprints202406.0210.v1 Alwakeel, A. M.; Alnaim, A. Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework. Preprints 2024, 2024060210. https://doi.org/10.20944/preprints202406.0210.v1

Abstract

The growing importance of edge and fog computing in the modern IT infrastructure is driven by the rise of decentralized applications. However, resource allocation within these frameworks is challenging due to varying device capabilities and dynamic network conditions. Conventional approaches often result in poor resource use and slowed advancements. This study presents a novel strategy for enhancing resource allocation in edge and fog computing by integrating machine learning with blockchain for reliable trust management. Our proposed framework, called CyberGuard, leverages blockchain’s inherent immutability and decentralization to establish a trustworthy and transparent network for monitoring and verifying edge and fog computing transactions. CyberGuard combines the Trust2Vec model with conventional machine learning models like SVM, KNN, and Random Forests, creating a robust mechanism for assessing trust and security risks. Through detailed optimization and case studies, CyberGuard demonstrates significant improvements in resource allocation efficiency and overall system performance in real-world scenarios. Our results highlight CyberGuard’s effectiveness, evidenced by a remarkable accuracy, precision, recall, and F1-Score of 98.18%, showcasing the transformative potential of our comprehensive approach in edge and fog computing environments.

Keywords

cloud computing; edge computing; fog computing; blockchain; trust management

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.