Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7709
Title: Security and Scheduling in Fog Computing
Authors: Sharma, Rishav
Geetanjali [Guided by]
Keywords: Security and Scheduling
Fog computing
Issue Date: 2019
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: Nowadays, We all are aware of cloud computing and its capabilities, cloud provides many services to the end users such as users can use cloud for storage purpose where the end user can store its data and can access that data from anywhere or as a platform to compile or run the programs but sill cloud has many limitations to the latency sensitive applications that is where latency is an issue and any delay can’t be tolerated in the application. If any delay would occur in the application then there would be a major problem for example in the disaster management application if there is any delay in the transmission and processing of the data then the results might be dangerous. To deal with such kind of problems a new field is emerging in which a virtual layer between the cloud and the end devices known as the fog layer is introduced. There are many security issues that occur in the fog layer and an appropriate security algorithm is needed to deal with those security issues. For this we have to keep many things in mind such as the processing capabilities of the fog nodes that if a particular scheme is applied in the fog layer and the encrypted message size is too large then the processing of that packet in the fog nodes may take a large amount of time and the processing cost of the network may increase, also the overall time may increase. Our first goal is to analyze the various challenges in terms of cyber security principles and provide an appropriate encryption scheme of the fog computing. The overall cost of the real time applications is going to reduce because of the virtual layer between the cloud and the IOT/end user devices, fog layer is going to reduce the overall transmission time and the processing cost of the application, If an appropriate scheduling algorithm is implemented in the fog layer to schedule the tasks that is which request from the end devices is passed to cloud or which request is handled in the fog layer. There are many algorithms for the fog computing to reduce the overall cost of the fog network but our second goal is to implement the priority-based scheduling algorithm in the fog environment to show that this is going to reduce the overall cost of the application.
URI: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7709
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Security and Scheduling in Fog Computing.pdf2.9 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.