Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/586331
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2024-08-29T12:18:47Z-
dc.date.available2024-08-29T12:18:47Z-
dc.identifier.urihttp://hdl.handle.net/10603/586331-
dc.description.abstractThe exponential increase in the number of connected devices within the IoT structure poses unprecedented challenges, especially in the field of cybersecurity. These devices have become increasingly vulnerable to cyber-attacks, ranging from simple exploits to sophisticated actions by competent adversaries. However, current security measures often fall short in adequately addressing the unique problems presented by the dynamic and diverse features associated with the IoT environment. Conventional modeling methodologies can be resource-intensive, posing challenges when applied to cloud devices with limited processing capabilities. Many businesses, entertainment, and government sector services require geographical data to provide information and security to users. In cloud computing, users can use location services by sending requests to the cloud, potentially leading to location privacy leakage and other vulnerabilities whereas in fog computing these services are provided by fog nodes. Being heterogenous various devices are also added at every stage in various applications so it is important to provide security. A complete solution to security is yet to be developed in these systems to overcome constraints including IoT devices. This thesis aims to design and implement a secure algorithm that reduces high computation and communication overhead and preserve privacy in fog computing environment. The security will help to preserve the personal data of the user from being compromised, at the same time maintaining the efficiency in terms of computation and communication cost. The following thesis revolves around the use case scenarios of three applications where design of secure fog computing using ABE has been implemented. The performance indicators of some ABE schemes such as CPU Efficacy of Data Generator, Bandwidth Effectiveness of Authority Key and Bandwidth Effectiveness of Data Generator have been discussed. A comparative analysis of this kind helps clarify performance related issues and gives us more clarity on h
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleDesign of improved attribute based encryption scheme for fog computing environment
dc.title.alternative
dc.creator.researcherShruti
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Interdisciplinary Applications
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideShalli Rani
dc.publisher.placeChandigarh
dc.publisher.universityChitkara University, Punjab
dc.publisher.institutionFaculty of Computer Science
dc.date.registered2020
dc.date.completed2024
dc.date.awarded2024
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Computer Science

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File106.96 kBAdobe PDFView/Open
abstract.pdf58.99 kBAdobe PDFView/Open
annexure.pdf283.41 kBAdobe PDFView/Open
chapter 1.pdf626.42 kBAdobe PDFView/Open
chapter 2.pdf172.83 kBAdobe PDFView/Open
chapter 3.pdf524.42 kBAdobe PDFView/Open
chapter 4.pdf568.08 kBAdobe PDFView/Open
chapter 5.pdf356.44 kBAdobe PDFView/Open
chapter 6.pdf547.49 kBAdobe PDFView/Open
chapter 7.pdf206.5 kBAdobe PDFView/Open
content.pdf124.59 kBAdobe PDFView/Open
preliminary pages.pdf289.19 kBAdobe PDFView/Open
title page.pdf9.68 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: