Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/586331
Title: | Design of improved attribute based encryption scheme for fog computing environment |
Researcher: | Shruti |
Guide(s): | Shalli Rani |
Keywords: | Computer Science Computer Science Interdisciplinary Applications Engineering and Technology |
University: | Chitkara University, Punjab |
Completed Date: | 2024 |
Abstract: | The exponential increase in the number of connected devices within the IoT structure poses unprecedented challenges, especially in the field of cybersecurity. These devices have become increasingly vulnerable to cyber-attacks, ranging from simple exploits to sophisticated actions by competent adversaries. However, current security measures often fall short in adequately addressing the unique problems presented by the dynamic and diverse features associated with the IoT environment. Conventional modeling methodologies can be resource-intensive, posing challenges when applied to cloud devices with limited processing capabilities. Many businesses, entertainment, and government sector services require geographical data to provide information and security to users. In cloud computing, users can use location services by sending requests to the cloud, potentially leading to location privacy leakage and other vulnerabilities whereas in fog computing these services are provided by fog nodes. Being heterogenous various devices are also added at every stage in various applications so it is important to provide security. A complete solution to security is yet to be developed in these systems to overcome constraints including IoT devices. This thesis aims to design and implement a secure algorithm that reduces high computation and communication overhead and preserve privacy in fog computing environment. The security will help to preserve the personal data of the user from being compromised, at the same time maintaining the efficiency in terms of computation and communication cost. The following thesis revolves around the use case scenarios of three applications where design of secure fog computing using ABE has been implemented. The performance indicators of some ABE schemes such as CPU Efficacy of Data Generator, Bandwidth Effectiveness of Authority Key and Bandwidth Effectiveness of Data Generator have been discussed. A comparative analysis of this kind helps clarify performance related issues and gives us more clarity on h |
Pagination: | |
URI: | http://hdl.handle.net/10603/586331 |
Appears in Departments: | Faculty of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 106.96 kB | Adobe PDF | View/Open |
abstract.pdf | 58.99 kB | Adobe PDF | View/Open | |
annexure.pdf | 283.41 kB | Adobe PDF | View/Open | |
chapter 1.pdf | 626.42 kB | Adobe PDF | View/Open | |
chapter 2.pdf | 172.83 kB | Adobe PDF | View/Open | |
chapter 3.pdf | 524.42 kB | Adobe PDF | View/Open | |
chapter 4.pdf | 568.08 kB | Adobe PDF | View/Open | |
chapter 5.pdf | 356.44 kB | Adobe PDF | View/Open | |
chapter 6.pdf | 547.49 kB | Adobe PDF | View/Open | |
chapter 7.pdf | 206.5 kB | Adobe PDF | View/Open | |
content.pdf | 124.59 kB | Adobe PDF | View/Open | |
preliminary pages.pdf | 289.19 kB | Adobe PDF | View/Open | |
title page.pdf | 9.68 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: