An Authentication Approach in a Distributed System Through Synergetic Computing
A synergetic computing mechanism is proposed to authenticate the validity of event data in merchandise exchange applications. The events are handled by the proposed synergetic computing system which is composed of edge devices. Asteroid_Node_on_Duty (ANOD) acts like a supernode to take the duty of c...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2025-01-01
|
Series: | Computers |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-431X/14/1/16 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832588759614357504 |
---|---|
author | Jia-Jen Wang Yaw-Chung Chen Meng-Chang Chen |
author_facet | Jia-Jen Wang Yaw-Chung Chen Meng-Chang Chen |
author_sort | Jia-Jen Wang |
collection | DOAJ |
description | A synergetic computing mechanism is proposed to authenticate the validity of event data in merchandise exchange applications. The events are handled by the proposed synergetic computing system which is composed of edge devices. Asteroid_Node_on_Duty (ANOD) acts like a supernode to take the duty of coordination. The computation performed by nodes in local area can reduce round-trip data propagation delay to distant data centers. Events with different risk levels are processed in parallel through different flows by using Chief chain (CC) and Telstar chain (TC) methods. Low-risk events are computed in edge nodes to form TC, which can be periodically integrated into CC that contains data of high-risk events. New authentication methods are proposed. The difficulty of authentication tasks is adjusted for different scenarios where lower difficulty in low-risk tasks may accelerate the process of validation. Authentication by a certain number of nodes is required so that the system may ensure the consistency of data. Participants in the system may need to register as members. The transaction processing speed on low-risk events may reach 25,000 TPS based on the assumption of certain member classes given that all of ANOD, and Asteroid_Node_of_Backup (ANB), Edge Cloud, and Core Cloud function normally. |
format | Article |
id | doaj-art-42d058979ae0408bb90d678b52ff6d7c |
institution | Kabale University |
issn | 2073-431X |
language | English |
publishDate | 2025-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Computers |
spelling | doaj-art-42d058979ae0408bb90d678b52ff6d7c2025-01-24T13:27:53ZengMDPI AGComputers2073-431X2025-01-011411610.3390/computers14010016An Authentication Approach in a Distributed System Through Synergetic ComputingJia-Jen Wang0Yaw-Chung Chen1Meng-Chang Chen2Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu City 30010, TaiwanDepartment of Computer Science, National Yang Ming Chiao Tung University, Hsinchu City 30010, TaiwanAcademia Sinica, Taipei City 115024, TaiwanA synergetic computing mechanism is proposed to authenticate the validity of event data in merchandise exchange applications. The events are handled by the proposed synergetic computing system which is composed of edge devices. Asteroid_Node_on_Duty (ANOD) acts like a supernode to take the duty of coordination. The computation performed by nodes in local area can reduce round-trip data propagation delay to distant data centers. Events with different risk levels are processed in parallel through different flows by using Chief chain (CC) and Telstar chain (TC) methods. Low-risk events are computed in edge nodes to form TC, which can be periodically integrated into CC that contains data of high-risk events. New authentication methods are proposed. The difficulty of authentication tasks is adjusted for different scenarios where lower difficulty in low-risk tasks may accelerate the process of validation. Authentication by a certain number of nodes is required so that the system may ensure the consistency of data. Participants in the system may need to register as members. The transaction processing speed on low-risk events may reach 25,000 TPS based on the assumption of certain member classes given that all of ANOD, and Asteroid_Node_of_Backup (ANB), Edge Cloud, and Core Cloud function normally.https://www.mdpi.com/2073-431X/14/1/16authenticationparallel processingbusiness of trading and exchange |
spellingShingle | Jia-Jen Wang Yaw-Chung Chen Meng-Chang Chen An Authentication Approach in a Distributed System Through Synergetic Computing Computers authentication parallel processing business of trading and exchange |
title | An Authentication Approach in a Distributed System Through Synergetic Computing |
title_full | An Authentication Approach in a Distributed System Through Synergetic Computing |
title_fullStr | An Authentication Approach in a Distributed System Through Synergetic Computing |
title_full_unstemmed | An Authentication Approach in a Distributed System Through Synergetic Computing |
title_short | An Authentication Approach in a Distributed System Through Synergetic Computing |
title_sort | authentication approach in a distributed system through synergetic computing |
topic | authentication parallel processing business of trading and exchange |
url | https://www.mdpi.com/2073-431X/14/1/16 |
work_keys_str_mv | AT jiajenwang anauthenticationapproachinadistributedsystemthroughsynergeticcomputing AT yawchungchen anauthenticationapproachinadistributedsystemthroughsynergeticcomputing AT mengchangchen anauthenticationapproachinadistributedsystemthroughsynergeticcomputing AT jiajenwang authenticationapproachinadistributedsystemthroughsynergeticcomputing AT yawchungchen authenticationapproachinadistributedsystemthroughsynergeticcomputing AT mengchangchen authenticationapproachinadistributedsystemthroughsynergeticcomputing |