An Authentication Approach in a Distributed System Through Synergetic Computing

A synergetic computing mechanism is proposed to authenticate the validity of event data in merchandise exchange applications. The events are handled by the proposed synergetic computing system which is composed of edge devices. Asteroid_Node_on_Duty (ANOD) acts like a supernode to take the duty of c...

Full description

Saved in:
Bibliographic Details
Main Authors: Jia-Jen Wang, Yaw-Chung Chen, Meng-Chang Chen
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/14/1/16
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832588759614357504
author Jia-Jen Wang
Yaw-Chung Chen
Meng-Chang Chen
author_facet Jia-Jen Wang
Yaw-Chung Chen
Meng-Chang Chen
author_sort Jia-Jen Wang
collection DOAJ
description A synergetic computing mechanism is proposed to authenticate the validity of event data in merchandise exchange applications. The events are handled by the proposed synergetic computing system which is composed of edge devices. Asteroid_Node_on_Duty (ANOD) acts like a supernode to take the duty of coordination. The computation performed by nodes in local area can reduce round-trip data propagation delay to distant data centers. Events with different risk levels are processed in parallel through different flows by using Chief chain (CC) and Telstar chain (TC) methods. Low-risk events are computed in edge nodes to form TC, which can be periodically integrated into CC that contains data of high-risk events. New authentication methods are proposed. The difficulty of authentication tasks is adjusted for different scenarios where lower difficulty in low-risk tasks may accelerate the process of validation. Authentication by a certain number of nodes is required so that the system may ensure the consistency of data. Participants in the system may need to register as members. The transaction processing speed on low-risk events may reach 25,000 TPS based on the assumption of certain member classes given that all of ANOD, and Asteroid_Node_of_Backup (ANB), Edge Cloud, and Core Cloud function normally.
format Article
id doaj-art-42d058979ae0408bb90d678b52ff6d7c
institution Kabale University
issn 2073-431X
language English
publishDate 2025-01-01
publisher MDPI AG
record_format Article
series Computers
spelling doaj-art-42d058979ae0408bb90d678b52ff6d7c2025-01-24T13:27:53ZengMDPI AGComputers2073-431X2025-01-011411610.3390/computers14010016An Authentication Approach in a Distributed System Through Synergetic ComputingJia-Jen Wang0Yaw-Chung Chen1Meng-Chang Chen2Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu City 30010, TaiwanDepartment of Computer Science, National Yang Ming Chiao Tung University, Hsinchu City 30010, TaiwanAcademia Sinica, Taipei City 115024, TaiwanA synergetic computing mechanism is proposed to authenticate the validity of event data in merchandise exchange applications. The events are handled by the proposed synergetic computing system which is composed of edge devices. Asteroid_Node_on_Duty (ANOD) acts like a supernode to take the duty of coordination. The computation performed by nodes in local area can reduce round-trip data propagation delay to distant data centers. Events with different risk levels are processed in parallel through different flows by using Chief chain (CC) and Telstar chain (TC) methods. Low-risk events are computed in edge nodes to form TC, which can be periodically integrated into CC that contains data of high-risk events. New authentication methods are proposed. The difficulty of authentication tasks is adjusted for different scenarios where lower difficulty in low-risk tasks may accelerate the process of validation. Authentication by a certain number of nodes is required so that the system may ensure the consistency of data. Participants in the system may need to register as members. The transaction processing speed on low-risk events may reach 25,000 TPS based on the assumption of certain member classes given that all of ANOD, and Asteroid_Node_of_Backup (ANB), Edge Cloud, and Core Cloud function normally.https://www.mdpi.com/2073-431X/14/1/16authenticationparallel processingbusiness of trading and exchange
spellingShingle Jia-Jen Wang
Yaw-Chung Chen
Meng-Chang Chen
An Authentication Approach in a Distributed System Through Synergetic Computing
Computers
authentication
parallel processing
business of trading and exchange
title An Authentication Approach in a Distributed System Through Synergetic Computing
title_full An Authentication Approach in a Distributed System Through Synergetic Computing
title_fullStr An Authentication Approach in a Distributed System Through Synergetic Computing
title_full_unstemmed An Authentication Approach in a Distributed System Through Synergetic Computing
title_short An Authentication Approach in a Distributed System Through Synergetic Computing
title_sort authentication approach in a distributed system through synergetic computing
topic authentication
parallel processing
business of trading and exchange
url https://www.mdpi.com/2073-431X/14/1/16
work_keys_str_mv AT jiajenwang anauthenticationapproachinadistributedsystemthroughsynergeticcomputing
AT yawchungchen anauthenticationapproachinadistributedsystemthroughsynergeticcomputing
AT mengchangchen anauthenticationapproachinadistributedsystemthroughsynergeticcomputing
AT jiajenwang authenticationapproachinadistributedsystemthroughsynergeticcomputing
AT yawchungchen authenticationapproachinadistributedsystemthroughsynergeticcomputing
AT mengchangchen authenticationapproachinadistributedsystemthroughsynergeticcomputing