Tradeoffs In Using Blockchain Technology For Security, Privacy, And Decentralization:theoretical And Empirical Perspectives
Abstract
This paper is and extended abstract of the doctoral thesis. It identifies four selected topics in which blockchain technology can have a positive or transformative effect on existing solutions. We propose new protocols, which change the current standards to add functionality, improve performance or overcome limitations of existing blockchain networks. Specifically, we focus on container orchestration on the edge using a unique blockchain protocol for security, verifiability, and trust.References
A. Tošić, “Empirična študija uporabe
tehnologije veriženja blokov v obstoječih sistemih in arhitekturah: doktorska disertacija,”Ph.D. dissertation, Univerza na Primorskem, Fakulteta za matematiko, naravoslovje in . . . ,2022.
E. Bayrak, J. Conley, and S. Wilkie, “The economics of cloud computing,” 2011.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al.,“A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.
A. Toši ć, J. Vičič, M. Burnard, and M. Mrissa, “A blockchain protocol for real-time application migration on the edge,” Sensors, vol. 23, no. 9, 2023. [Online]. Available: https://www.mdpi.com/1424-8220/23/9/4448
D. Boneh, J. Bonneau, B. B ̈unz, and B. Fisch, “Verifiable delay functions,” in Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Pro-ceedings, Part I. Springer, 2018, pp. 757–788.
DOI:
https://doi.org/10.31449/inf.v47i2.4965Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







