应用科学学报 ›› 2020, Vol. 38 ›› Issue (1): 1-21.doi: 10.3969/j.issn.0255-8297.2020.01.001
方俊杰1,2, 雷凯1,2
收稿日期:
2019-11-14
出版日期:
2020-01-31
发布日期:
2020-01-19
作者简介:
雷凯,副研究员.研究方向为命名数据网络、区块链、联邦学习.E-mail:leik@pkusz.edu.cn.
基金资助:
FANG Junjie1,2, LEI Kai1,2
Received:
2019-11-14
Online:
2020-01-31
Published:
2020-01-19
摘要: 区块链构建了一个分布式点对点的系统,作为一种安全可验证的分散确认事务的机制,广泛应用于金融经济、物联网、大数据、云计算和边缘计算领域.边缘人工智能计算(edgeAI computing)即面向边缘网络应用场景的群智AI计算模式.在无人驾驶等高动态、超低延时、资源受限、数据与计算解耦的边缘网络应用场景下,跨域可信、隐私保护、入侵监测、细粒度激励等需求对区块链研究提出了进一步的挑战.关注到人工智能向边缘网络下放的趋势,该文讨论区块链在新兴的边缘人工智能计算领域的应用.首先介绍了区块链技术的基础架构,概述了相关研究和应用方向;接着从边缘人工智能计算的概念与兴起出发,详细分析并讨论了区块链技术在面向边缘人工智能计算领域的应用需求,包括相关研究综述、应用趋势和未来研究方向.此外,还总结了区块链技术应用在边缘人工智能计算方面的优势和未来仍需关注的问题.
中图分类号:
方俊杰, 雷凯. 面向边缘人工智能计算的区块链技术综述[J]. 应用科学学报, 2020, 38(1): 1-21.
FANG Junjie, LEI Kai. Blockchain for Edge AI Computing: A Survey[J]. Journal of Applied Sciences, 2020, 38(1): 1-21.
[1] Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2019-11-16]. https://bitcoin.org/en/bitcoin-paper. [2] Gao W, Hatcher W G, Yu W. A survey of blockchain:techniques, applications, and challenges[C]//201827th International Conference on Computer Communication and Networks (ICCCN), 2018:1-11. [3] Zheng Z, Xie S, Dai HN, et al. Blockchain challenges and opportunities:a survey[J]. International Journal of Web and Grid Services, 2018, 14(4):352-375. [4] A berkeley view of systems challenges for AI[EB/OL].[2019-11-16]. https://arxiv.org/abs/1712.05855. [5] OpenEI:an open framework for edge intelligence[EB/OL].[2019-11-16]. https://arxiv.org/abs/1906.01864v1. [6] Edge intelligence:paving the last mile of artificial intelligence with edge computing[EB/OL].[2019-11-16]. https://arxiv.org/abs/1905.10083v1. [7] Edge intelligence:the confluence of edge computing and artificial intelligence[EB/OL].[2019-11-16]. https://arxiv.org/abs/1909.00560. [8] Yang R, Yu F R, Si P, et al. Integrated blockchain and edge computing systems:a survey, some research issues and challenges[J]. IEEE Communications Surveys&Tutorials, 2019, 21(2):1508-1532. [9] Salah K, Rehman M H U, Nizamuddin N, et al. Blockchain for AI:review and open research challenges[J]. IEEE Access, 2019, 7:10127-10149. [10] Li X, Jiang P, Chen T, et al. A survey on the security of blockchain systems[J]. Future Generation Computer Systems, 2017. [11] The Tangle:an illustrated introduction[EB/OL].[2019-11-16]. https://iota.org/IOTA_Whitepaper.pdf. [12] Jin T, Zhang X, Liu Y, et al. BlockNDN:a bitcoin blockchain decentralized system over named data networking[C]//2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), 2017:75-80. [13] Wood G. Ethereum:a secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014, 151(2014):1-32. [14] Bitshares 2.0:general overview[EB/OL].[2019-11-16]. https://cryptorating.eu/whitepapers/BitShares/bitshares-general.pdf. [15] Androulaki E, Barger A, Bortnikov V, et al. Hyperledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference, 2018:30. [16] Turk Ž, Klinc R. Potentials of blockchain technology for construction management[J]. Procedia Engineering, 2017, 196:638-645. [17] Huckle S, Bhattacharya R, White M, et al. Internet of things, blockchain and shared economy applications[J]. Procedia Computer Science, 2016, 98:461-466. [18] Hurich P. The virtual is real:an argument for characterizing bitcoins as private property[J]. Banking&Finance Law Review, 2016, 31(3):573. [19] Dorri A, Kanhere S S, Jurdak R, et al. Blockchain for IoT security and privacy:the case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops), 2017:618-623. [20] Zhang Y, Wen J. The IoT electric business model:using blockchain technology for the internet of things[J]. Peer-to-Peer Networking and Applications, 2017, 10(4):983-994. [21] Stanciu A. Blockchain based distributed control system for edge computing[C]//201721st International Conference on Control Systems and Computer Science (CSCS), 2017:667-671. [22] Ouaddah A, Abou E A, Ait O A. FairAccess:a new blockchain-based access control framework for the Internet of Things[J]. Security and Communication Networks, 2016, 9(18):5943-5964. [23] Primecoin:cryptocurrency with prime number proof-of-work[EB/OL].[2019-11-16]. https://www.techylib.com/en/view/tangibleassistant/primecoin_cryptocurrency_with_prime_number_proof-of-work. [24] Eyal I, Gencer A E, Sirer E G, et al. Bitcoin-ng:a scalable blockchain protocol[C]//13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), 2016:45-59. [25] Dfinity technology overview series, consensus system[EB/OL].[2019-11-16]. https://arxiv.org/abs/1805.04548. [26] Kim S, Kwon Y, Cho S. A survey of scalability solutions on blockchain[C]//2018 International Conference on Information and Communication Technology Convergence (ICTC), 2018:1204-1207. [27] Luu L, Narayanan V, Zheng C, et al. A secure sharding protocol for open blockchains[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016:17-30. [28] Bit Info Charts[EB/OL].[2019-11-16]. https://bitinfocharts.com/ethereum/. [29] Ehmke C, Wessling F, Friedrich C M. Proof-of-property:a lightweight and scalable blockchain protocol[C]//Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, 2018:48-51. [30] Garzik J. Block size increase to 2MB[J]. Bitcoin Improvement Proposal, 2015, 102. [31] Backman J, Yrjölä S, Valtanen K, et al. Blockchain network slice broker in 5G:slice leasing in factory of the future use case[C]//2017 Internet of Things Business Models, Users, and Networks, 2017:1-8. [32] The bitcoin lightning network:Scalable off-chain instant payments[EB/OL].[2019-11-16]. https://lightning.network/lightning-network-paper.pdf. [33] Enabling blockchain innovations with pegged sidechains[EB/OL].[2019-11-16]. URL:http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-peggedsidechains. [34] Poon J, Buterin V. Plasma:scalable autonomous smart contracts[J]. White Paper, 2017:1-47. [35] Eyal I, Sirer E G. Majority is not enough:bitcoin mining is vulnerable[J]. Communications of the ACM, 2018, 61(7):95-102. [36] Apostolaki M, Zohar A, Vanbever L. Hijacking bitcoin:routing attacks on cryptocurrencies[C]//2017 IEEE Symposium on Security and Privacy (SP), 2017:375-392. [37] Heilman E, Kendler A, Zohar A, et al. Eclipse attacks on bitcoin0s peer-to-peer network[C]//24th USENIX Security Symposium (USENIX Security 15), 2015:129-144. [38] Kiayias A, Panagiotakos G. On trees, chains and fast transactions in the blockchain[C]//International Conference on Cryptology and Information Security in Latin America, 2017:327-351. [39] Luu L, Velner Y, Teutsch J, et al. Smartpool:practical decentralized pooled mining[C]//26th USENIX Security Symposium (USENIX Security 17), 2017:1409-1426. [40] Tian F. An agri-food supply chain traceability system for China based on RFID&blockchain technology[C]//201613th International Conference on Service Systems and Service Management (ICSSSM), 2016:1-6. [41] Dennis R, Owen G. Rep on the block:a next generation reputation system based on the blockchain[C]//201510th International Conference for Internet Technology and Secured Transactions (ICITST), 2015:131-138. [42] Axon L. Privacy-awareness in blockchain-based PKI[J]. Cdt Technical Paper Series, 2015. [43] Zyskind G, Nathan O. Decentralizing privacy:using blockchain to protect personal data[C]//2015 IEEE Security and Privacy Workshops, 2015:180-184. [44] Sharma P K, Chen M Y, Park J H. A software defined fog node based distributed blockchain cloud architecture for IoT[J]. IEEE Access, 2017, 6:115-124. [45] Li C, Zhang L J. A blockchain based new secure multi-layer network model for Internet of Things[C]//2017 IEEE International Congress on Internet of Things (ICIOT), 2017:33-41. [46] Samaniego M, Deters R. Hosting virtual iot resources on edge-hosts with blockchain[C]//2016 IEEE International Conference on Computer and Information Technology (CIT), 2016:116-119. [47] Samaniego M, Deters R. Virtual resources&blockchain for configuration management in IoT[J]. Journal of Ubiquitous Systems and Pervasive Networks, 2017, 9(2):01-13. [48] Veena P, Panikkar S, Nair S, et al. Empowering the edge-practical insights on a decentralized Internet of Things[J]. Empowering the Edge-Practical Insights on a Decentralized Internet of Things. IBM Institute for Business Value, 2015:17. [49] Adept:an iot practitioner perspective[EB/OL].[2019-11-16]. [50] Russell S J, Norvig P. Artificial intelligence:a modern approach[M]. Malaysia:Pearson Education Limited, 2016. [51] Goodfellow I, Bengio Y, Courville A. Deep learning[M]. Cambridge, Massachusetts:MIT Press, 2016. [52] Lecun Y, Bengio Y, Hinton G. Deep learning[J]. Nature, 2015, 521(7553):436-444. [53] Diamant A, Chatterjee A, Vallières M, et al. Deep learning in head&neck cancer outcome prediction[J]. Scientific Reports, 2019, 9(1):2764. [54] Liu Y. Novel volatility forecasting using deep learning-long short term memory recurrent neural networks[J]. Expert Systems with Applications, 2019, 132:99-109. [55] Whatmough P N, Lee S K, Brooks D, et al. DNN engine:a 28 nm timing-error tolerant sparse deep neural network processor for IoT applications[J]. IEEE Journal of Solid-State Circuits, 2018, 53(9):2722-2731. [56] Liu Y, Wang Y, Yang X, et al. Short-term travel time prediction by deep learning:a comparison of different LSTM-DNN models[C]//2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), 2017:1-8. [57] Uddin M Z, Kim M R. A deep learning-based gait posture recognition from depth information for smart home applications[M].[S.l.]:Springer, 2016:407-413. |
[1] | 何正源, 段田田, 张颖, 张瀚文, 孙毅. 物联网中区块链技术的应用与挑战[J]. 应用科学学报, 2020, 38(1): 22-33. |
[2] | 李忠诚, 黄建华, 唐瑞琮, 胡庆春, 夏旭. 一种基于权益代表的可扩展共识协议[J]. 应用科学学报, 2020, 38(1): 51-64. |
[3] | 邹秀清, 罗得寸, 林平, 沈世平, 谢振平, 王玉珏, 丁勇. 基于区块链的河长制水质信息存证系统[J]. 应用科学学报, 2020, 38(1): 65-80. |
[4] | 苑陈娟, 孙国梓, 李华康, 王纪涛. 牌类游戏可信存证链系统[J]. 应用科学学报, 2020, 38(1): 81-92. |
[5] | 江云超, 何小卫, 崔一举. 区块链节点存储优化方案[J]. 应用科学学报, 2020, 38(1): 119-126. |
[6] | 潘恒, 潘磊, 姚中原, 斯雪明. 一种病人可控的电子病历安全访问方案[J]. 应用科学学报, 2020, 38(1): 127-138. |
[7] | 佘维, 陈建森, 顾志豪, 田钊, 徐力, 刘炜. 基于区块链的物联网节点位置隐私保护模型[J]. 应用科学学报, 2020, 38(1): 139-151. |
[8] | 雷凯, 黄硕康, 方俊杰, 黄济乐, 谢英英, 彭波. 智能生态网络:知识驱动的未来价值互联网基础设施[J]. 应用科学学报, 2020, 38(1): 152-172. |
[9] | 张利华, 胡方舟, 黄阳, 万源华, 李晶晶. 基于联盟链的微电网身份认证协议[J]. 应用科学学报, 2020, 38(1): 173-183. |
[10] | 张逸飞, 曹少中, 祁德力, 王亮, 杨彦红. 基于区块链的图书侵权记录存证平台[J]. 应用科学学报, 2020, 38(1): 184-196. |
[11] | 任鹏, 徐晶晶, 王意, 马小峰. 基于区块链和车联网的汽车租赁联盟的研究与实现[J]. 应用科学学报, 2019, 37(6): 851-858. |
[12] | 范贤丽, 范春晓, 吴岳辛. 基于区块链和IPFS技术实现粮食供应链隐私信息保护[J]. 应用科学学报, 2019, 37(2): 179-190. |
[13] | 李博, 郑博, 郭子阳, 王宏志. 区块链技术在金融方向应用的发展及展望[J]. 应用科学学报, 2019, 37(2): 151-163. |
[14] | 吕婧淑, 操晓春, 杨培. 基于区块链和人脸识别的双因子身份认证模型[J]. 应用科学学报, 2019, 37(2): 164-178. |
[15] | 宾晟, 孙更新, 周双. 基于区块链技术的社交网络中舆情传播模型[J]. 应用科学学报, 2019, 37(2): 191-202. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||