Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/586490
Title: | Secure and Fault Tolerant Distributed Data Management In Fog Based IOT |
Researcher: | JALASRI M |
Guide(s): | Lakshmanan M |
Keywords: | Automation and Control Systems Computer Science Engineering and Technology |
University: | Sathyabama Institute of Science and Technology |
Completed Date: | 2023 |
Abstract: | In recent times, the Internet of Things (IoT) placed a vital role in newlinevarious applications because various devices are connected to make newlinecommunication effective. Cloud computing is used to process and newlinecompute the data, but certain approaches are needed near edge devices newlinedue to latency, bandwidth, and storage limitations. A fog computing newlineservice extends some of the capabilities of cloud computing to end newlineusers. Fog Computing (FC) offers end-users computational, storage, and newlinenetwork resources within the IoT. Using fog-IoT devices, specialised newlinecomputations, latency, and storage can be performed across the internet newlinebackbone. Managing data between fog servers and fog nodes as well as newlinebetween fog nodes and users presents a number of issues for fog-IoT newlinecomputing, including intermediary threats, data privacy, confidentiality, newlineauthentication, integrity, and energy consumption. The major objective newlineof this study is to integrate several methodologies in order to improve newlinethe security and fault tolerance performance of Fog-IoT systems. The newlineproposed research is explained with four subsequent proposed chapters. newlineClustering algorithm is introduced namely Low Energy Adaptive newlineClustering Hierarch (LEACH) with Dijkstra s algorithm. First, power newlineprobabilistic criteria are applied to determine the cluster heads, and then newlinevi newlinea clustering procedure is enacted in order to transmit data in fog newlinesystems. newlineCode-Based Encryption (CBE) has been proposed for security newlineand managing data transmission. The Code-based encryption newlinetechnique is used to achieve a data security challenges like data integrity newlineand authentication while transmission. newlineFog Computing Based Fault Tolerance Clustering Protocol newline(FC-FTCP) has been proposed to ensure a decentralized computing newlinestructure for managing the data in various logical locations. FC-FTCP newlineoffers multiple services and cloud-related solutions to the decentralized newlinenetwork s security problems. It is used to reduce intermediate attack. newlineFinally, Data Security Management Model (DSMM) has been newlineproposed for a fog based heal |
Pagination: | vii, 203 |
URI: | http://hdl.handle.net/10603/586490 |
Appears in Departments: | COMPUTER SCIENCE DEPARTMENT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 141.09 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 1.3 MB | Adobe PDF | View/Open | |
03_content.pdf | 322.36 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 83.88 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 809.32 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 713.19 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 467.08 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 237.03 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 553.22 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 1.2 MB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 23.51 kB | Adobe PDF | View/Open | |
12_annexures.pdf | 1.39 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 141.09 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Altmetric Badge: