Optimized Security for Blockchain Edge-Fog Systems Performance Analysis and Optimization Strategies

Authors

  • basman saman University of Information Technology and Communications
  • Jolan Rokan Naif University of Information Technology and Communications

DOI:

https://doi.org/10.25195/ijci.v51i2.610

Keywords:

Resource Management, 5G RAN Techniques, Cloud Computing, Edge Computing, Network Slicing, 5G, Data Streaming , Fog Computing , Cloud Computing , Big Data , Quality of Service., IoT Security, Performance Analysis, Blockchain Security, PBFT Consensus

Abstract

The trends of resource consumption and optimization mechanisms for blockchain-enabled security in edge-fog computing environments. While blockchain provides robust security for fog networks in a decentralized fashion, its demand for resources creates tremendous challenge in resource-constrained settings. Through in-depth examination of a Practical Byzantine Fault Tolerance PBFT-based blockchain deployment across 50 edge devices and 10 fog nodes. The study reveals the most critical resource bottlenecks and proposes an adaptive resource management framework that maximizes the tradeoff between security requirements and operational efficiency dynamically. The proposed work shows that data-type-based optimization and intelligent workload distribution can reduce CPU utilization by 27%, memory by 22%, and network bandwidth by 38% without sacrificing security assurance. The introduction of a novel dynamic resource allocation algorithm that adjusts consensus participation and cryptographic strength to current system conditions, demonstrating that security-performance trade-offs can be optimally resolved through context-sensitive optimization. These advancements are a move towards resource-constrained security architectures for edge-fog computing, enabling the broader applicability of blockchain security in resource-poor IoT environments.

Downloads

Download data is not yet available.

Author Biographies

basman saman, University of Information Technology and Communications

Informatics Institute for Postgraduate Studies

Jolan Rokan Naif, University of Information Technology and Communications

Informatics Institute for Postgraduate Studies

Downloads

Published

2025-10-10