Article Information
Corresponding Author: Jong Hyuk Park , jhpark1@seoultech.ac.kr
Haotian Chen, Dept. of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Korea, chahot@seoultech.ac.kr
Abir EL Azzaoui, Dept. of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Korea, abir.el@seoultech.ac.kr
Sekione Reward Jeremiah, Dept. of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Korea, reward@seoultech.ac.kr
Jong Hyuk Park, Dept. of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, Korea, jhpark1@seoultech.ac.kr
Received: November 22 2022
Revision received: January 26 2023
Revision received: March 2 2023
Accepted: March 2 2023
Published (Print): April 30 2023
Published (Electronic): April 30 2023
1. Introduction
Cyber risks are numerous, and the impact of the coronavirus disease 2019 (COVID-19) pandemic in 2019 exacerbated these challenges. The COVID-19 pandemic has affected both large and small enterprises economically, spawning many online business models and prompting many companies to explore online markets, which on the other side, increases network and information security challenges. Alliance Virtual Offices (AVO) analyzed hundreds of studies and millions of data points to determine the impact and costs of continuing to work remotely or hybrid in businesses after the pandemic. One key finding from the AVO report was that cybercriminals' target on remote workers increased, and there was a 238% increase in cyber-attacks on remote server access due to working from home [1]. In that regard, network security is increasingly valued by enterprises and users. One of the significant challenges facing network security today is the urgent need to address privacy and trust among heterogeneous devices. In particular, dishonest third-party entities in centralized data centers may sell large amounts of private data for financial gain [2]. With the continuous development of wireless communication and information processing technology, many intelligent devices are needed to process real-time data in heterogeneous IIoT environment. However, they face significant challenges since they dynamically communicate and provide processed results to achieve industrial intelligence [3].
The industrial Internet of Things (IIoT) collects data through heterogeneous intelligent devices and transmits collected data to servers, a classic application scenario of a distributed network. IIoT leverages deep learning, natural language processing, computer vision, and robotic process automation to build an intelligent industrial system. Driven by the IIoT, smart devices are overgrowing, and the volume of data is increasing. In addition, heterogeneous devices' have different computing power, storage capacity and security mechanism [4], causing them security risks. For example, in multiparty computing, the heterogeneity of the IIoT could be a starting point for cyber-attacks. Attackers can access networks and sensitive data by hacking IIoT devices with lower performance than ordinary computers to learn enterprise entities' latest business strategies or objectives [5]. In some cases, business partnerships require sensitive data exchange to accomplish work collaboration, which many do not desire. This is because the privately collected data can be interpreted through data mining and big data analysis techniques to understand an entity's business strategies and objectives. Such undertakings can negatively affect business initiatives and plans [6].
Studies show that blockchain is a reliable technology to solve the problems of privacy disclosure and trust [7]. Blockchain can solve the problem of source trust and result verification, but it lacks the protection function for the privacy of computing input. Still, multi-party computation (MPC) can fully protect this input. In the meantime, MPC has the characteristics of privacy of information, the correctness of calculation and decentralization, and maintaining data confidentiality to solve the problems of private data sharing, data analysis and mining [8]. In a distributed network, multiple participating entities hold their private input data, and all parties hope to complete the calculation of a specific function jointly. Still, each participating entity must obtain no input information from other participating entities except the calculation results. MPC guarantees that neither party shall acquire any information other than its processed output and correctness of the received data. Moreover, MPC prevents dishonest participants denial-of-service attacks interruptions [9].
However, the efficiency of MPC in IIoT has been a high-profile challenge. Since most of the devices in IIoT don't have enough computing power to do MPC, they often require a robust cloud server to do the calculations, and the IIoT devices are only responsible for transferring their data. Second, the input to the MPC may be illegal, and performing calculations with invalid inputs may result in wasted time and computing resources. In contrast, anyone, by default, can join multiparty calculations. In addition, the default first-come, first-served service mode leads to strong randomness in the selection of cloud servers. Tasks requiring complex computing power may be assigned to servers with relatively low computing power, thus slowing down the progress of the overall IIoT intelligence work. Finally, when the user is unsatisfied with the cloud service, there is no way to provide feedback to the cloud server.
In this paper, we propose a smart contract-based MPC cloud server selection framework to ensure the effectiveness and efficiency of all MPC participants. We aim to develop a high-efficiency framework for valid identity authentication under the IIoT environment. Our framework divides the IIoT system into three layers, with blockchain deployed at the edge layer to provide verification. Smart contracts deployed at the cloud layer ensures efficient operation of MPC at the cloud layer. The framework solves the following problems: (1) overall efficiency defects of cloud selection-based MPC; (2) lack of incentive mechanism between an efficient cloud server and participating edge nodes; (3) unknown node participating in MPC; and (4) cloud servers' repudiation of their calculation results.
The main contributions of this paper are as follows:
We propose an efficient server selection method that enables each device to select the most suitable server for computing its task and dramatically reducing computing latency.
Blockchain provides authentication and identification functions. It ensures that all nodes joining the MPC are authenticated, and unauthenticated nodes cannot access network resources in the framework. Only devices registered in the Blockchain can participate in cloud computing.
The blockchain network ensures the witness and accountability characteristics of the computational results.
Smart contracts help the cloud to achieve a highly differentiated server hierarchy so that users with different needs can choose the most suitable server according to their needs.
Smart contracts marginalize untrusted cloud nodes by assessing their reputation level in the cloud environment. Furthermore, it prevents malicious cloud nodes from controlling the MPC process.
The rest of the paper is organized as follows: Section 2 presents a general overview of other existing research. Section 3 proposes a smart contract-based MPC cloud server selection framework for IIoT in the cloud environment. We further provide an overview of the architecture and explain its process flows. Section 4 evaluates the proposed framework with extensive simulations analysis and presents our findings. Finally, in Section 5, we conclude this paper.
2. Related Work
The IIoT paradigm has developed rapidly, and the security mechanism is constantly improving. In this section, we discuss the key considerations and existing researches attempting to improve the efficiency of multiparty computing in IIoT networks.
2.1 Key Considerations
An IIoT-based cloud environment has four critical requirements for efficient multiparty computation.
Efficiency: Some subindustries in the IIoT require low-latency data processing, while others require high-bandwidth data processing. However, regardless of the utilized model, the computational efficiency should be as high as possible under the appropriate model. This paper provides an MPC model based on optimized cloud selection with higher computing efficiency and lower communication delay.
Scalability: IIoT has so many subindustries that it is difficult to have a single model that perfectly fits all industrial needs. But it should be compatible as much as possible or as easily adjustable to match the diverse technology ecosystem of the future. In this paper, all edge nodes can choose the server that suits them according to their own needs and thus perform well even in a heterogeneous IIoT environment.
Availability: Many IIoT devices are based on real-time communication connections and operations. In distributed networks, if one node (server or device) fails, processes on other nodes should be able to continue. In this paper, smart contract has independent control over edge nodes, and each edge node is independently subject to the control of a smart contract. Therefore, even if some edge or cloud nodes have problems, the complete network service will not be affected.
Non-repudiation: Cloud servers' service quality and attitude differ in the mixed cloud environment. There may be cases where the cloud server makes a fatal error but denies it. In this paper, blockchain technology is used. The certified nodes store the results of cloud selection and the values of the calculated results in the blockchain; no one can modify these contents. This ensures that the cloud server cannot deny its behavior and faults.
2.2 Existing Researches
IIoT is a globally distributed system composed of intelligent objects, physical information assets, related general information technology, and auxiliary computing platforms such as cloud or edge com¬puting [10] . For IIoT, performance needs to be evaluated from multiple perspectives, using techni¬ques appropriate to its characteristics. Table 1 summarizes some studies on networks efficiency [11-15].
Summary of existing research
Zhou et al. [11] pointed out that the increase of IoT devices will lead to the problem of insufficient spectrum resources of the 5G network on which the IoT depends and the solution of allocating unused spectrum of human-to-human network to machine-to-machine network. An asymmetric framework with privacy protection, incentive compatibility, and efficient spectrum allocation is designed from a realistic perspective. This research considers secure resource allocation over physical channels but does not specify a secure design for edge services. Tian et al. [12] expounded on the problems of privacy disclosure and precision insufficiency of edge computing with the increasing number of intelligent devices and proposed a learning framework suitable for the IIoT environment. Their proposed framework improves multiparty learning models' accuracy and data processing efficiency on edge services. The size weighted aggregation strategy was presented to verify and integrate model parameters and improve the model's accuracy. Theoretical analysis and simulation show that this method protects data security and has low overhead for the edge service of IIoT. Bugshan et al. [13] developed a distributed privacy protection technology based on microservices, using differential privacy and radial basis function network to balance the model performance of privacy protection and edge network. Kumari et al. [14] emphasized the data transmission problem in the industrial Internet environment. They proposed a Blockchain-based decentralized chemical IIoT model to meet the security and privacy of mass data. A simulation comparison is made from load balance, energy management cost, and transmission delay, and the results show that the delay is lower than in the traditional Blockchain system.
It was an exciting finding that many researchers used security and efficiency as essential indicators, especially for network research. Li et al. [15] classified three types of privacy among data owners, third-party cloud servers, and data users. A lightweight privacy protection protocol for the data owner server data user model is proposed based on homomorphic encryption. Simulation results show that the scheme effectively prevents privacy leakage in the IoT. The cost of evaluating computing moves from resource-constrained IIoT devices to powerful third-party servers without compromising security and privacy. This approach allows remote, untrusted cloud computing to perform complex computations on encrypted data. It also allows data owners and users to verify decryption accuracy. However, there are apparent communication efficiency problems.
3. Smart Contract-based Optimal Node Selection Framework
This section presents a hierarchical description of the proposal's architecture, and we discuss the process flow of data at different levels and explain the workings of the smart contract. Finally, from a general perspective, the whole data processing stages is presented. As shown in Fig. 1, the proposed MPC framework based on smart contracts is divided into three main layers: the IIoT device layer, the edge layer, and the cloud layer. Data is transmitted bottom-up from the device layer to the cloud. In this section, we will discuss the role of each layer and the details of how they work.
Proposed smart contract-based optimal node selection framework.
Device layer: At this layer, sensors collect various industrial data and perform limited data operations on local smart devices before forwarding the data to the upper layer, the edge layer. The computational performance of smart devices is much lower than that of conventional computers, so their data operations cannot be done locally. High-performance servers in the cloud are the desired target for device layer data.
Edge layer: A public Blockchain network is provide on this layer where devices are authenticated. Here, other nodes in the network need to recognize all participants through the consensus mechanism. At the same time, as the manager of the blockchain, the base station must carry out essential identification and legitimacy authentication for all data collected by the device layer. In this layer, the users are now termed edge node.
Cloud layer: Each edge node selects one server from many cloud servers and uses it for work. When the work is finished, the corresponding edge nodes can give evaluation feedback to the server, which will affect the comprehensive performance evaluation of the server in the cloud. The input confidentiality of MPC ensures that the attacker is unaware of other edge nodes' input information during the whole process from the perspective of the mathematical theory of discrete algebra. Suppose the encrypted data cannot be decrypted in real time, or the cost required to decrypt it is much higher than the value of the data itself. In that case, we consider this method of encryption mathematically secure. Because of smart contracts' the speed of server selection that meets edge node indicators is significantly increased, and the computing efficiency is also greatly improved.
3.1 Workflow of the Proposed Framework
Fig. 2 illustrates the workflow of the device and edge layers for the proposed framework to illustrate a more accurate data flow and network structure.
Workflow of proposed framework about device and edge layer.
The sensor collects data and uploads it to the edge layer, where authentication is required for security. We use the public blockchain here, allowing all nodes to join the blockchain network and using proof-of-work (PoW) for authentication. All edge nodes that want to join multiparty computing at the edge layer must register with the Blockchain system. They need to go through the consensus mechanism when they want to transfer data to the upper layer. The entity target of authentication is the device itself. To save energy, the device can continuously send transmitted data after being authenticated once rather than requiring authentication each time. This can significantly save computing resources.
As shown in Algorithm 1, edge nodes will compute a hash value with the first N terms being 0. This is a random problem, and the device that wants to be authenticated needs to compete with other nodes to get this number quickly, so the process is fair for all nodes involved in the calculation. The number of bits of [TeX:] $$N$$ depends on the consensus algorithm. A new [TeX:] $$N$$ of similar complexity is generated when an N is computed.
Blockchain authentication & verification.
For all nodes in the network that want to participate in calculating a standard password puzzle, the first edge node to calculate the result will be published in the network. Other nodes in the network will witness it, and only when the result of more than half of the agreement will it be considered to reach a consensus. After the consensus mechanism is passed, the data will be ready to be sent to the cloud under the constraints of the smart contract, and a block will also be generated. When the consensus is reached, the public key of the corresponding edge node will also be transmitted to other nodes. At this time, the identity information of the data source can be confirmed through a digital signature, and it is non-repudiation. This allows the edge node (and only the edge node) to sign a signature that can be verified against a public key stored in the blockchain. This identity of the edge node can serve as a decentralized source of verification. Upon completion of the consensus, the client sends the data to the cloud on the premise that the client agrees to the smart contract.
3.2 Server Selection Process
Sensors in smart devices collect data in different industrial environments. At the edge layer, the base station acts as the manager of the blockchain, registering node registration information of all data sources. The edge node then sends the data to the cloud and, after confirming that they agree to the constraints of the smart contract, starts to choose the server. After confirmation, each device is registered with the blockchain network and is termed an Authenticator in the blockchain network.
Workflow of smart contract in cloud layer.
In Algorithm 2, we first consider server performance. As shown in Fig. 3, the edge nodes send a computation request to the cloud, requiring it to return its performance metrics. Only the cloud nodes that satisfy the minimum performance metrics needed for the computation operations can participate in this request. The second essential requirement is the estimated time to operate on the data held by the edge node, which will be the maximum. This measures the efficiency of a calculation, requiring a maximum number of seconds to complete the calculation. In the search results of the two items, select the intersection, which is the theoretical alternative cloud server. Performance is the priority if there is no intersection between two search results. If the intersection of the search results for the two required conditions is not unique, the edge node will use another extension condition to determine the option. At this point, the edge node will issue another query to the servers in the candidate area, asking them who can do the task faster. Then choose a better one or several of them. If we get to this point and there are still multiple servers to choose from, we choose the one that is physically closest to us, bringing lower latency to our overall process. After the server is selected, multiparty computation begins.
The evaluation criterion of the edge node is the edge node's satisfaction degree to the cloud node's computing results, that is, the allowable delay of returning the computing results. After the calculation, the edge node will also evaluate the data and, based on their satisfaction with the data, send feedback and an evaluation message to the corresponding server, which will affect the performance options in the cloud server in the first step. The higher the performance and lower the delay of the server, the higher the reputation. Each time the server gets feedback, the smart contract forces it to change its reputation value, directly affecting whether other edge nodes select it and how often it is selected. When cloud servers get lousy feedback, their reputation suffers (and vice versa). Because reputation selection is the top priority for other edge nodes when choosing a server. Reputation changes will be updated to the blockchain, meaning no one can modify or change it. Any new node added to the blockchain can more easily see a cloud server's historical and current performance. All operations will be performed automatically when the preset instructions are met. Based on this feature, we store the results in the blockchain, ensuring the process is transparent, open, and traceable.
3.3 Smart Contract Design
A smart contract is a trusted global execution machine that temporarily escrows assets and executes a set of predefined instructions [16]. As shown in Algorithm 3, the smart contract initiates when all edge nodes grant control to the smart contract and start selecting the best server they want. The predefined instructions specify the conditions that must be met for the computation to proceed. Based on this feature, we store the results in the blockchain, ensuring the process is transparent, open, and traceable. As shown in Fig. 4, the first two requests are made, one for reputation and the other for minimum computation time. After the first request is sent, you must receive a waiting list, but sometimes the waiting list is empty (null value). If neither requirement is met, the participant will not participate in MPC and will try sending the request again after a specific time. If only one condition is met, ask the edge node whether to continue. If the edge node originates from MPC with limited reception performance, it can participate in this calculation. Otherwise, it will quit and try cloud selection again after another period. If there are multiple servers to choose from, in this case, there will be two alternate lists, and you can get the best one by taking their intersection, or additional requirements are sent to those servers, which can provide higher performance. Then choose the best one. If multiple options still exist, select the one that is physically closest to you, with the lowest latency and highest efficiency from the data communication point of view.
After the server selection is complete, MPC computation is performed. After the MPC operation, the edge node takes the data back, executes it, and then makes a feedback report according to the satisfaction degree of delay. If the delay is satisfactory to the edge node, it will give positive feedback. Otherwise, it will be negative. The value of this evaluation will affect the reputation of a cloud server. The cloud server performs reputation ranking when the edge node reputation evaluation is completed.
The latest ranking and previous ranking of the cloud server and which cloud service did this calculation will be updated to the blockchain, which means that the change in the reputation ranking is not modifiable and can be verified jointly by anyone.
There are many types of servers in the cloud, and their performance varies. The performance of a cloud server determines whether the server can handle edge node requirements. Related to this, this framework provides an incentive mechanism between cloud servers and nodes participating in MPC. Cloud servers must provide honest and efficient services to have a higher probability of being selected by most users and generate revenue, while poorly performing cloud servers will be marginalized due to fewer selection opportunities. Users can get high efficiency by choosing a high-performance server and get better economic benefits.
Smart contract for reputation control.
Smart contract method for optimal cloud selection.
4. Evaluation and Performance
For our research, the most important thing is to evaluate the accuracy of analytical data and the difference in computation time with or without a smart contract. The second is to assess the delay gap caused by selecting the server with the closest physical distance after selecting a plurality of high-performance servers in the cloud selection stage.
4.1 Experiment Setup
We intend to use Hyperledger Fabric to build a blockchain network. Fabric is a framework that provides a modular distributed ledger solution with features such as confidentiality, scalability, flexibility, and extensibility. Fabric is also a blockchain project within the Hyperledger, containing a ledger, uses smart contracts, and is a system for managing transactions through all participants. Fabric allows the creation of a channel, allowing participants to create a separate ledger for a transaction. Only participants in the same track have the ledger in the channel, while other participants not in the channel cannot see the ledger. The channel's isolation technology brings higher security. It is also an essential Fabric feature.
Information on Hyperledger Fabric attributes
We analyze the proposed MPC framework using Ubuntu 18.04 and i7 processor with 32 GB RAM. As shown in Table 2, the information required for the experimental environment is given. We started with the initial version of Fabric and summarized the iterations and upgrades. Fabric 1.3 was adequate for our study; although Fabric 1.3 is not the latest version, it is still suitable for our research. Therefore, the Blockchain network on the edge layer is built utilizing the Hyperledger Fabric version 1.3. Many languages are supported for this release, such as Java, Go, Node.js, and Python, but we chose Python. Since Fabric 1.3 is only compatible with Python3.6, we use Python3.6 to create the smart contract. Virtual Cloud and Edge nodes are generated using VMware 14 with a set of 2 edge nodes ([TeX:] $$e_1, e_2$$), and 5 Cloud nodes ([TeX:] $$c_1, c_2, c_3, c_4, c_5$$). [TeX:] $$c_1$$ and [TeX:] $$c_2$$ have a ranking reputation of 3, computing power of 1 GHz, and memory of 256 MB. [TeX:] $$c_3$$ and [TeX:] $$c_4$$ have a ranking reputation of 1, computing power of 600 MHz, and memory of 128 MB. [TeX:] $$c_5$$ has a reputation of 0 with 300 MHz computing power and a memory of 64 MB, indicating poor performance probability. A total of 10 tasks ([TeX:] $$t_1, t_2, t_3 \ldots, t_{10}$$) of 15 MB each are measured that are selected as delay-intolerant tasks. The performance evaluation of task computation is based on the optimal selection of cloud operators using the baseline parameters set by the smart contract, which includes task completion accuracy, the proximity of the cloud node with the edge node, and the time required to complete the task.
4.2 Performance Evaluation
Each task is set with a delay tolerance of 3 ms to measure the effectiveness of the framework's support for computation accuracy. Of the two edge nodes in total, [TeX:] $$e_1$$, and [TeX:] $$e_2$$ have 10 tasks each. For comparison with the baseline model, we assume that [TeX:] $$e_1$$ implements the proposed MPC framework's optimal cloud node selection process. The second edge node [TeX:] $$e_1$$, [TeX:] $$e_2$$, selects cloud nodes based on a first-come-first-serve (FCFS) basis. Furthermore, at the edge layer, [TeX:] $$e_1$$ and [TeX:] $$e_2$$ are part of the blockchain network and maintain access control measures preventing unknown devices from uploading data for computation operations.
Fig. 5 illustrates the computation efficiency between [TeX:] $$e_1$$ and [TeX:] $$e_2$$ based on two different data computation operation methods selected. The blockchain at the edge node ([TeX:] $$e_1$$ and [TeX:] $$e_2$$) represents devices pre-authorized and validated to transmit computation requests at cloud nodes.
Comparison of computation efficiency between the proposed method and FCFS method.
Both [TeX:] $$e_1$$ and [TeX:] $$e_2$$ selects cloud operators from nodes [TeX:] $$c_1, c_2, c_3, c_4$$,and [TeX:] $$c_5$$. We pre-assign each cloud node with three pre-existing computation tasks to increase the computation time required for future tasks. Additionally, cloud nodes [TeX:] $$c_1, c_3, c_4$$,and [TeX:] $$c_5$$ are placed in proximity to [TeX:] $$e_1$$. We observe that [TeX:] $$e_1$$ selects [TeX:] $$c_1, c_2$$,and [TeX:] $$c_3$$ due to their higher reputation ranking and lower time required to complete the assigned tasks. Although [TeX:] $$c_1$$ and [TeX:] $$c_2$$ are each running a single task, they have higher computing power than the remaining cloud nodes. The second edge node, [TeX:] $$e_2$$ selects [TeX:] $$c_3,c_4$$, and [TeX:] $$c_5$$ cloud nodes based on which the cloud node communicates with the edge node requesting the computation task. The overall time required by cloud nodes selected by [TeX:] $$e_1$$. They are much lower and complete all 10 tasks in less than 3 ms. The optimal selection of cloud nodes shows that the proposed framework makes high-performance computing of tasks possible. The baseline model using the FCFS method ([TeX:] $$e_2$$) took 1.7 ms more than the proposed framework, making it unsuitable for low delay-tolerant computing operations. Overall, efficiency increased by 44.73%. The minimum required for task completion is 3 ms, and Tasks 8–10 take more than 3 ms for task completion due to the unoptimized selection of cloud nodes using the FCFS model.
In Fig. 6, we observe the effect of selecting a cloud node [TeX:] $$c_1$$ by [TeX:] $$e_1$$ and compare it with the task computations performance of other nodes [TeX:] $$c_2$$ and [TeX:] $$c_3$$. Cloud nodes [TeX:] $$c_1$$ and [TeX:] $$c_2$$ share a similar reputation ranking of 3, the amount of memory, and the processing power to perform high-performance computations. In this test, we removed all previous running tasks from all three cloud nodes to accurately measure the task completion time. However, due to the proximity of node [TeX:] $$c_1$$ with edge node [TeX:] $$e_1$$, the network selects [TeX:] $$c_1$$ for computation operations. We observe that each task of 15 MB, between [TeX:] $$c_1, c_2$$, and [TeX:] $$c_3$$, [TeX:] $$c_1$$ and [TeX:] $$c_2$$ have nearly identical performances with total task completion times of 1.8 and 1.9 milliseconds (ms). Both nodes complete tasks more quickly due to their higher computation power and memory. However, the proximity of [TeX:] $$c_1$$ to [TeX:] $$e_1$$ makes it a better selection due to its reduced time to receive, complete the computation task and return results to the edge node [TeX:] $$e_1$$. An additional observation is the performance between [TeX:] $$c_1$$ and [TeX:] $$c_3$$, where there is a noticeable delay of 1 ms by [TeX:] $$c_3$$ to complete all tasks. The increased latency is despite both [TeX:] $$c_1$$ and [TeX:] $$c_3$$ being in proximity to [TeX:] $$e_1$$. [TeX:] $$c_3$$ has lower computation power of 600 Mhz and a memory of 128 MB, resulting in only holding a maximum of 8 tasks of 15 MB each. [TeX:] $$c_3$$ is required to wait for task completion to load the final two tasks in its memory.
The proposed Smart Contract based optimal selection of cloud nodes has superior computation performance for IIoT devices than the FCFS-based baseline model. Efficient computation of tasks is essential for IIoT networks. The Smart Contract based selection of reputation ranking and task completion time, along with the penalty incurred due to poor performance, ensures that only ideal clouds are selected in the task assignment process.
Comparison of latency between the cloud nodes [TeX:] $$c_1, c_2$$, and [TeX:] $$c_3$$.
4.3 Performance Analysis
This section analyzes similar studies based on proposed requirements for efficient MPC. As shown in Table 2, we compare recent studies on cloud service selection and MPC, then discuss them regarding the efficient MPC considerations we provide in Section 2.1.
Kumar et al. [17] proposed a new framework named optimal service selection and ranking of cloud computing services (CCS-OSSR). Users who want to choose a cloud server evaluate and compare existing services based on QoS standards and choose a better one. This method has better consistency and fewer comparison times from a high-performance cloud server selection perspective. However, this framework does not address a cloud environment's continuous and frequently changing requirements and is, therefore, unsuitable for heterogeneous networks such as IIoT. The framework also ignores the verification of the results of dishonest cloud servers, each of which can try not to take responsibility for a problem by denying it. Jatoth et al. [18] proposed the multi-criteria decision-making model (MCDM), in which QoS parameters are first quantified, and different QoS-based hierarchies are allocated to cloud servers considering user preferences. This method effectively resolves the uncertainty of service selection while maintaining the efficiency and scalability of cloud services. While this model performs well in terms of efficiency, it also does not consider the non-repudiation required in computing like MPC. Kumar et al. [19] also used AHP and TOPSIS to determine the most suitable candidate cloud services. Under this framework, cloud selection data is processed with high efficiency and data correctness is ensured through methods that verify its accuracy. As a result, the server cannot deny its calculation results. Sun et al. [20] broke new ground and questioned the independent evaluation criteria for cloud service selection technology. A framework of cloud service selection with criteria interactions (CSSCI) is proposed to solve the service selection problem without historical information to determine the standard relationships and weights. Their research can always choose the best server in the ranking, and more realistic indicators are discussed. We hold reservations about the expansibility of this method. The more interactions between standards are considered, the more communication overhead will exist in the complex and heterogeneous IIoT environment. Therefore, with the addition of heterogeneous data, the efficiency of the network may be reduced. In summary, the above literature discusses cloud computing efficiency but ignores non-repudiation.
Aside from discussing the studies of cloud selection, it is also valuable to discuss research on MPC that guarantees non-repudiation. Several studies [21-23] are a collection of similar studies that propose a secure MPC framework and use blockchain technology to assist or support MPC. However, they also have a similar disadvantage: their efficiency is limited. An MPC technology based on the Hyperledger Fabric framework is created in [21], which can protect the private data of all participating users, but the efficiency of information processing is insufficient. A study [22] proposed a reputed mutual incentive blockchain-based MPC scheme (BFR-MPC), which has the characteristics of high fairness and stability but cannot adapt to a wide range of efficient deployment requirements. Guan et al. [23] proposed a blockchain-based dual-side privacy-preserving multiparty computation scheme for an edge-enabled smart grid (BPM4SG). This approach uses consortium blockchains and smart contracts to further enhance the system's security and avoid dependence on trusted third parties. In addition, a data obfuscation method based on ring signatures and a new one-time address scheme is proposed to protect the data owner and receiver's privacy. Furthermore, the above three types of literature use the characteristics of blockchain to emphasize the trustworthiness and non-repudiation of the MPC process, but they do not consider efficiency and scalability in their frameworks. Still, their frameworks do not take efficiency and scalability into consideration.
Key consideration comparisons with other related works
By comparing the results of all the works in Table 3, it is clear that non-repudiation is almost ignored by all the research schemes considering efficient cloud selection in recent years. At the same time, the latest research on MPC often focuses on security and trust. In contrast, research on Blockchain as a solution often lacks the consideration of efficiency and expansibility. The proposed cloud selection framework ensures computing efficiency by selecting the best cloud server and communication efficiency by physical distance. Meanwhile, all nodes certified by blockchain are valid data providers, and their interactions with cloud nodes will be recorded in blockchain to ensure that no one can tamper with the results. All cloud nodes will not be able to deny their behavior. At the same time, no matter how many edge nodes try to join the MPC, they have different needs for different tasks. They can allocate resources according to their needs, reducing the pressure on a single cloud node and thus providing scalability in the entire cloud environment. Blockchain and cloud environments are distributed networks characterized by high availability. Meanwhile, the characteristics of MPC also include the tolerance of specific malicious nodes. Therefore, the overall availability of this framework is beyond doubt. Of course, there are weaknesses in our proposed model, which we will discuss in the next section.
4.4 Discussion
This section discusses open research challenges. This paper proposes an efficient cloud selection framework based on smart contract, which reasonably solves the heterogeneous computation task requirements in the IIoT environment. Each user chooses the best cloud server to meet their needs according to their business requirements, thus ensuring overall computing efficiency. Meanwhile, based on the blockchain configured in the edge layer, all nodes attempting to participate in MPC must be authenticated and confirm their information sources, thus ensuring information validity for each edge node participating in cloud MPC. For MPC, the fact that each input is validated increases the accuracy and computational efficiency of the whole process because the probability of malicious information is lower. In addition, according to the smart contract, the return delay of MPC calculation results can be verified, thus reducing the probability of malicious cloud nodes tampering with data and the problem of insecure clouds being selected. With the operation of smart contracts, incentives constantly change the reputation ranking of cloud nodes, and malicious edge nodes will be gradually marginalized. From the whole process, the cloud node and edge node motivate each other; the edge node can give the cloud node a higher reputation value to increase its frequency of use. The cloud node feeds back the edge node with efficient and correct calculation results. Supposing fewer and fewer users select a malicious cloud node, its maintenance cost will be progressively higher, thus maintaining the overall stability of the network. At the same time, high-performance and high-reputation cloud nodes are increasingly selected, and their revenue will also increase.
Our research also found weaknesses in the proposed framework. Several open research challenges for future studies have been previously discussed. Our proposed framework is still not secure enough. Attackers can steal data from the edge layer or cloud. Although the mechanism of MPC itself is secure, there is a risk of data theft before and after MPC participation. This means that various challenges in actual applications still face the framework. Future research will address this issue to ensure efficient cloud-secure multiparty computing in IIoT.
5. Conclusion
This paper proposes a network architecture based on the blockchain and smart contract to provide comprehensive performance assurance for the IIoT network. Blockchain-based authentication and identification ensure data validity for every user participating in MPC. The smart contract-based cloud server selection strategy ensures that each participating node receives the best service that suits its requirements or exceeds expectations, with lower latency. The cloud server gets a reputation ranking for computing performance based on aggregated feedback from all users it serves. The cloud nodes' computing records and reputation ranking values are recorded in the blockchain. This ensures non-repudiation and public witnessing of cloud nodes' computing results and reputation rankings. The reputation level improves the enthusiasm of other users in the network to choose the server, forming a benign incentive mechanism to promote the interaction between nodes and the server. Deductive results show that the framework we provided in this study has excellent performance and low latency. Compared with the baseline method, the efficiency improved by 44.73%. We plan to design a more comprehensive and secure MPC algorithm to fit this efficient framework in future work.