Cloud usage has increased rapidly, except when it comes to the notable integration of IOT with Industry
4.0.This study seeks to challenge the limits of Cloud uses. As a result, the integration of Cloudlet
(middleware) in some critical applications is growing rapidly with the expansion of Cloud applications.
The Cloudlet is being deployed as a necessary component in the industrial network to ensure data
synchronization, security, and stability. Based on our recent studies, this work will focus on how to
maintain stability in a Cloudlets network. In other words, the goal is to ensure that all nodes remain stable,
meaning that all the Cloudlets are connected to the Cloud and able to transmit data independently,
regardless of the constraints imposed by the industrial environment. The first part of this work is to define
the problem, discuss how Cloudlet can resolve some Cloud limits. Then, we define the stability and its
models. In effect, the experiments in a real industrial environment are presented. Finally, the results are
analysed.
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
Fog computing or fog networking, also known as fogging, is an architecture that uses edge devices to carry out a substantial amount of computation, storage, and communication locally and routed over the internet backbone.
This document discusses security issues related to data management in wireless communication and sensor networks over cloud environments. It begins by describing wireless sensor networks and cloud computing individually, noting key characteristics like location independence and on-demand access. It then discusses how wireless sensor networks and cloud computing can be integrated using technologies like PHP and MySQL. The main body of the document focuses on security challenges in cloud computing environments, including issues related to virtualization, networking, and browser-based attacks that can carry over risks from traditional systems. It concludes that secure data transmission to and from the cloud is an important issue that requires mitigation techniques like encryption algorithms.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
This document discusses methods for ensuring data security in cloud computing environments. It begins by introducing cloud computing models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The main goals of data security - confidentiality, integrity, and availability - are then described. Several methods for data security are proposed, including data fragmentation where sensitive data is divided and distributed across different domains. Encryption techniques are also discussed as ways to protect confidential data during storage and transmission. Overall, the document aims to evaluate approaches for addressing key issues around securing user data in cloud systems.
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
A capillary network is a local network that uses short-range radio-access technologies to provide local connectivity to things and devices. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society.
The fast emerging of internet of things (IoTs) has introduced fog computing as an intermediate layer between end-users and the cloud datacenters. Fog computing layer characterized by its closeness to end users for service provisioning than the cloud. However, security challenges are still a big concern in fog and cloud computing paradigms as well. In fog computing, one of the most destructive attacks is man-in-the-middle (MitM). Moreover, MitM attacks are hard to be detected since they performed passively on the network level. This paper proposes a MitM mitigation scheme in fog computing architecture. The proposal mapped the fog layer on software-defined network (SDN) architecture. The proposal integrated multi-path transmission control protocol (MPTCP), moving target defense (MTD) technique, and reinforcement learning agent (RL) in one framework that contributed significantly to improving the fog layer resources utilization and security. The proposed schema hardens the network reconnaissance and discovery, thus improved the network security against MitM attack. The evaluation framework was tested using a simulation environment on mininet, with the utilization of MPTCP kernel and Ryu SDN controller. The experimental results shows that the proposed schema maintained the network resiliency, improves resource utilization without adding significant overheads compared to the traditional transmission control protocol (TCP).
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
Fog computing or fog networking, also known as fogging, is an architecture that uses edge devices to carry out a substantial amount of computation, storage, and communication locally and routed over the internet backbone.
This document discusses security issues related to data management in wireless communication and sensor networks over cloud environments. It begins by describing wireless sensor networks and cloud computing individually, noting key characteristics like location independence and on-demand access. It then discusses how wireless sensor networks and cloud computing can be integrated using technologies like PHP and MySQL. The main body of the document focuses on security challenges in cloud computing environments, including issues related to virtualization, networking, and browser-based attacks that can carry over risks from traditional systems. It concludes that secure data transmission to and from the cloud is an important issue that requires mitigation techniques like encryption algorithms.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
This document discusses methods for ensuring data security in cloud computing environments. It begins by introducing cloud computing models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The main goals of data security - confidentiality, integrity, and availability - are then described. Several methods for data security are proposed, including data fragmentation where sensitive data is divided and distributed across different domains. Encryption techniques are also discussed as ways to protect confidential data during storage and transmission. Overall, the document aims to evaluate approaches for addressing key issues around securing user data in cloud systems.
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
A capillary network is a local network that uses short-range radio-access technologies to provide local connectivity to things and devices. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society.
The fast emerging of internet of things (IoTs) has introduced fog computing as an intermediate layer between end-users and the cloud datacenters. Fog computing layer characterized by its closeness to end users for service provisioning than the cloud. However, security challenges are still a big concern in fog and cloud computing paradigms as well. In fog computing, one of the most destructive attacks is man-in-the-middle (MitM). Moreover, MitM attacks are hard to be detected since they performed passively on the network level. This paper proposes a MitM mitigation scheme in fog computing architecture. The proposal mapped the fog layer on software-defined network (SDN) architecture. The proposal integrated multi-path transmission control protocol (MPTCP), moving target defense (MTD) technique, and reinforcement learning agent (RL) in one framework that contributed significantly to improving the fog layer resources utilization and security. The proposed schema hardens the network reconnaissance and discovery, thus improved the network security against MitM attack. The evaluation framework was tested using a simulation environment on mininet, with the utilization of MPTCP kernel and Ryu SDN controller. The experimental results shows that the proposed schema maintained the network resiliency, improves resource utilization without adding significant overheads compared to the traditional transmission control protocol (TCP).
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
Abstract. Fog computing is a promising computing paradigm that ex-
tends cloud computing to the edge of networks. Similar to cloud comput-
ing but with distinct characteristics, fog computing faces new security
and privacy challenges besides those inherited from cloud computing. In
this paper, we have surveyed these challenges and corresponding solu-
tions in a brief manner.
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
Cloud computing is an Internet-based, emerging technology, tends to be prevailing in our environment especially in the field of computer sciences and information technologies which require network computing on large scale. Cloud Computing is a shared pool of services which is gaining popularity due to its cost, effectiveness, avilability and great production. Along with its numerous benefits, cloud computing brings much more challenging situation regarding data privacy, data protection, authenticated access, Intellectual property rights etc. Due to these issues, adoption of cloud computing is becoming difficult in today’s world. In this review paper, various security issues regarding data privacy and reliability, key factors which are affecting cloud computing, have been addressed and also suggestions on particular areas have been discussed.
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networksijwmn
The flexibility and diversity of Wireless Mobile Networks offer many opportunities that are not always taken into account by existing distributed systems. In particular, the proliferation of mobile users and the use of mobile Ad-Hoc promote the formation of collaborative groups to share resources. We propose a solution for the management of fault tolerance in the Ad-Hoc networks, combining the functions needed to better availability of data. Our contribution takes into account the characteristics of mobile terminals in order to reduce the consumption of resources critical that energy, and to minimize the loss of information. Our solution is based on the formation of clusters, where each is managed by a node leader. This solution is mainly composed of four sub-services, namely: prediction, replication, management of nodes in the cluster and supervision. We have shown, using several sets of simulation, that our solution is twofold: minimizing the
Wireless sensor networks have profound effects on many application fields like security management which
need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a
major issue in chemical industry field. This paper describes the design of chemical warehouse security
system using the concept of active products and wireless sensor networks. A security application layer is
developed to supervise and exchange messages between nodes and the control center to prevent industrial
accident. Different security rules are proposed on this layer to monitor the internal state and incompatible
products distance. If a critical event is detected, the application generates alert message which need a short
end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is
also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
Application and Network Layers Design for Wireless Sensor Network to Supervis...IJCSEA Journal
Wireless sensor networks have profound effects on many application fields like security management which need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a major issue in chemical industry field. This paper describes the design of chemical warehouse security system using the concept of active products and wireless sensor networks. A security application layer is developed to supervise and exchange messages between nodes and the control center to prevent industrial accident. Different security rules are proposed on this layer to monitor the internal state and incompatible products distance. If a critical event is detected, the application generates alert message which need a short end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
This document summarizes a research paper that proposes using cloud computing to improve storage models for wireless devices. The paper develops a new storage model that uses cloud computing techniques like public and private clouds, topology algorithms, and cloudlets to improve battery life and data storage for mobile devices. It derives a mathematical equation to measure the power provided by a battery and the average battery time under different usage scenarios. The paper also discusses techniques like virtual cloud providers, WINC sleep mode, and Google Location services to further optimize wireless device performance and energy efficiency when using cloud-based storage and applications.
Efficient architectural framework of cloud computing Souvik Pal
This document discusses an efficient architectural framework for cloud computing. It begins by providing background on cloud computing and discusses challenges such as security, privacy, and reliability. It then proposes a new architectural framework that separates infrastructure as a service (IaaS) into three sub-modules: IaaS itself, a hypervisor monitoring environment (HME), and resources as a service (RaaS). The HME acts as middleware between IaaS and physical resources, using a hypervisor to allocate resources from a pool managed by RaaS. This proposed framework is intended to improve performance and access speed for cloud computing.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
This document discusses security and privacy issues of fog computing based on a survey of existing work. It begins with an overview of fog computing, defining it as an extension of cloud computing to the edge of networks. It then identifies several key security and privacy challenges of fog computing, including issues of trust and authentication, network security, secure data storage, and secure and private data computation. Several potential solutions are also briefly discussed, such as reputation-based trust models, biometric authentication, software-defined networking for security, and techniques like homomorphic encryption to enable verifiable and private computation on outsourced data.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET Journal
This document summarizes a research paper that proposes using delay tolerant network (DTN) approaches for data dissemination in fog computing networks. It describes a hybrid data dissemination framework with a two-plane architecture: 1) the cloud serves as a control plane to process content updates and organize data flows, and 2) geometrically distributed fog servers form a data plane to disseminate data among themselves using DTN techniques. This allows non-urgent, high-volume content to be distributed across fog servers in an efficient manner without relying on expensive bandwidth between the fog and cloud layers.
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources) within cloud based infrastructure,meanfully overcome the cost and improve the reliability and performance of whole system. Cloud computing provides on-demand network access and batch of computing services for SCADA system. The current research paper takes two conceptual ideas to implement SCADA system within cloud computing (Hybrid Cloud) environment. In the first phase, SCADA applications are processed entirely inside the hybrid cloud. In the second phase, SCADA applications are running in separate application server directly connected to devices in a SCADA network and rest of paper discusses the security related to SCADA and cloud computing communication.
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING IJNSA Journal
The use of mobile devices is common among people and something essential these days. These devices have limited resources which makes it critical to provide security without compromising user ergonomics, given the large number of cyberattacks that occur. This work proposes a context-aware security mechanism for Mobile Cloud Computing providing a security level of device data privacy from the analysis of the attributes of the network that is connected, available level of RAM, CPU, and battery at the time of communication. of data with the cloud. In addition, Transport Layer Security (TLS) technology is used to create a secure channel for sending data between the client and the server and implement the analysis of the mobile device context using Fuzzy logic. The impact of the proposed mechanism on mobile device performance was measured through stress tests. The proposed mechanism had a superior performance of 38% in the number of executions, 10% of memory, and 0.6% of CPU about the use of a single type of predefined symmetric algorithm for private network environment.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
Fog computing is an architecture that distributes computing, storage, control and networking functions closer to users along the cloud-to-thing continuum compared to traditional cloud computing architectures. It aims to provide a seamless continuum of services from the cloud to end devices. Key differences between fog and edge computing are that fog is more inclusive, seeks to realize a seamless continuum rather than isolated platforms, and envisions a horizontal platform to support multiple industries. Fog computing is expected to enable new commercial opportunities and business models by providing integrated end-to-end services and applications through the convergence of cloud and fog platforms.
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingHarshitParkar6677
The cloud is migrating to the edge of the network, where
routers themselves may become the virtualisation infrastructure,
in an evolution labelled as “the fog”. However, many
other complementary technologies are reaching a high level
of maturity. Their interplay may dramatically shift the information
and communication technology landscape in the
following years, bringing separate technologies into a common
ground. This paper offers a comprehensive definition
of the fog, comprehending technologies as diverse as cloud,
sensor networks, peer-to-peer networks, network virtualisation
functions or configuration management techniques. We
highlight the main challenges faced by this potentially breakthrough
technology amalgamation.
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Dr.Costas Sachpazis
Consolidation Settlement Calculation Program-The Python Code
By Professor Dr. Costas Sachpazis, Civil Engineer & Geologist
This program calculates the consolidation settlement for a foundation based on soil layer properties and foundation data. It allows users to input multiple soil layers and foundation characteristics to determine the total settlement.
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
Abstract. Fog computing is a promising computing paradigm that ex-
tends cloud computing to the edge of networks. Similar to cloud comput-
ing but with distinct characteristics, fog computing faces new security
and privacy challenges besides those inherited from cloud computing. In
this paper, we have surveyed these challenges and corresponding solu-
tions in a brief manner.
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
Cloud computing is an Internet-based, emerging technology, tends to be prevailing in our environment especially in the field of computer sciences and information technologies which require network computing on large scale. Cloud Computing is a shared pool of services which is gaining popularity due to its cost, effectiveness, avilability and great production. Along with its numerous benefits, cloud computing brings much more challenging situation regarding data privacy, data protection, authenticated access, Intellectual property rights etc. Due to these issues, adoption of cloud computing is becoming difficult in today’s world. In this review paper, various security issues regarding data privacy and reliability, key factors which are affecting cloud computing, have been addressed and also suggestions on particular areas have been discussed.
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networksijwmn
The flexibility and diversity of Wireless Mobile Networks offer many opportunities that are not always taken into account by existing distributed systems. In particular, the proliferation of mobile users and the use of mobile Ad-Hoc promote the formation of collaborative groups to share resources. We propose a solution for the management of fault tolerance in the Ad-Hoc networks, combining the functions needed to better availability of data. Our contribution takes into account the characteristics of mobile terminals in order to reduce the consumption of resources critical that energy, and to minimize the loss of information. Our solution is based on the formation of clusters, where each is managed by a node leader. This solution is mainly composed of four sub-services, namely: prediction, replication, management of nodes in the cluster and supervision. We have shown, using several sets of simulation, that our solution is twofold: minimizing the
Wireless sensor networks have profound effects on many application fields like security management which
need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a
major issue in chemical industry field. This paper describes the design of chemical warehouse security
system using the concept of active products and wireless sensor networks. A security application layer is
developed to supervise and exchange messages between nodes and the control center to prevent industrial
accident. Different security rules are proposed on this layer to monitor the internal state and incompatible
products distance. If a critical event is detected, the application generates alert message which need a short
end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is
also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
Application and Network Layers Design for Wireless Sensor Network to Supervis...IJCSEA Journal
Wireless sensor networks have profound effects on many application fields like security management which need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a major issue in chemical industry field. This paper describes the design of chemical warehouse security system using the concept of active products and wireless sensor networks. A security application layer is developed to supervise and exchange messages between nodes and the control center to prevent industrial accident. Different security rules are proposed on this layer to monitor the internal state and incompatible products distance. If a critical event is detected, the application generates alert message which need a short end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
This document summarizes a research paper that proposes using cloud computing to improve storage models for wireless devices. The paper develops a new storage model that uses cloud computing techniques like public and private clouds, topology algorithms, and cloudlets to improve battery life and data storage for mobile devices. It derives a mathematical equation to measure the power provided by a battery and the average battery time under different usage scenarios. The paper also discusses techniques like virtual cloud providers, WINC sleep mode, and Google Location services to further optimize wireless device performance and energy efficiency when using cloud-based storage and applications.
Efficient architectural framework of cloud computing Souvik Pal
This document discusses an efficient architectural framework for cloud computing. It begins by providing background on cloud computing and discusses challenges such as security, privacy, and reliability. It then proposes a new architectural framework that separates infrastructure as a service (IaaS) into three sub-modules: IaaS itself, a hypervisor monitoring environment (HME), and resources as a service (RaaS). The HME acts as middleware between IaaS and physical resources, using a hypervisor to allocate resources from a pool managed by RaaS. This proposed framework is intended to improve performance and access speed for cloud computing.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
This document discusses security and privacy issues of fog computing based on a survey of existing work. It begins with an overview of fog computing, defining it as an extension of cloud computing to the edge of networks. It then identifies several key security and privacy challenges of fog computing, including issues of trust and authentication, network security, secure data storage, and secure and private data computation. Several potential solutions are also briefly discussed, such as reputation-based trust models, biometric authentication, software-defined networking for security, and techniques like homomorphic encryption to enable verifiable and private computation on outsourced data.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the traditional method, a user's private key is directly stored on IoTs, so the private key may be disclosed under various malicious attacks. Furthermore, these methods require a lot of energy, which drains the resources of IoT-devices. A signature scheme based on the elliptic curve digital signature algorithm (ECDSA) is proposed in this paper to improve the security of the private key and the time taken for key-pair generation. ECDSA security is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), which allows one to use much smaller groups. Smaller group sizes directly translate into shorter signatures, which is a crucial feature in settings where communication bandwidth is limited, or data transfer consumes a large amount of energy. In this paper, we have chosen the safe curve types of elliptic-curve cryptography (ECC) such as M221, SECP256r1, curve 25519, Brainpool P256t1, and M-551. These types of curves are the most secure curves of other curves of ECC as their security is based on the complexity of the ECDLP of the curve. And these types of curves exceed the complexity of the ECDLP. A valid signature can be generated without reestablishing the whole private key. ECDSA ensures data security and successfully reduces intermediate attacks. The efficiency and effectiveness of ECDSA in the IoT environment are validated by experimental evaluation and comparison analysis. The results indicate that, in comparison to the two-party ECDSA and RSA, the proposed ECDSA decreases computation time by 65% and 87%, respectively. Additionally, as compared to two-party ECDSA and RSA, respectively, it reduces energy consumption by 77% and 82%.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET Journal
This document summarizes a research paper that proposes using delay tolerant network (DTN) approaches for data dissemination in fog computing networks. It describes a hybrid data dissemination framework with a two-plane architecture: 1) the cloud serves as a control plane to process content updates and organize data flows, and 2) geometrically distributed fog servers form a data plane to disseminate data among themselves using DTN techniques. This allows non-urgent, high-volume content to be distributed across fog servers in an efficient manner without relying on expensive bandwidth between the fog and cloud layers.
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources) within cloud based infrastructure,meanfully overcome the cost and improve the reliability and performance of whole system. Cloud computing provides on-demand network access and batch of computing services for SCADA system. The current research paper takes two conceptual ideas to implement SCADA system within cloud computing (Hybrid Cloud) environment. In the first phase, SCADA applications are processed entirely inside the hybrid cloud. In the second phase, SCADA applications are running in separate application server directly connected to devices in a SCADA network and rest of paper discusses the security related to SCADA and cloud computing communication.
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING IJNSA Journal
The use of mobile devices is common among people and something essential these days. These devices have limited resources which makes it critical to provide security without compromising user ergonomics, given the large number of cyberattacks that occur. This work proposes a context-aware security mechanism for Mobile Cloud Computing providing a security level of device data privacy from the analysis of the attributes of the network that is connected, available level of RAM, CPU, and battery at the time of communication. of data with the cloud. In addition, Transport Layer Security (TLS) technology is used to create a secure channel for sending data between the client and the server and implement the analysis of the mobile device context using Fuzzy logic. The impact of the proposed mechanism on mobile device performance was measured through stress tests. The proposed mechanism had a superior performance of 38% in the number of executions, 10% of memory, and 0.6% of CPU about the use of a single type of predefined symmetric algorithm for private network environment.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
Fog computing is an architecture that distributes computing, storage, control and networking functions closer to users along the cloud-to-thing continuum compared to traditional cloud computing architectures. It aims to provide a seamless continuum of services from the cloud to end devices. Key differences between fog and edge computing are that fog is more inclusive, seeks to realize a seamless continuum rather than isolated platforms, and envisions a horizontal platform to support multiple industries. Fog computing is expected to enable new commercial opportunities and business models by providing integrated end-to-end services and applications through the convergence of cloud and fog platforms.
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingHarshitParkar6677
The cloud is migrating to the edge of the network, where
routers themselves may become the virtualisation infrastructure,
in an evolution labelled as “the fog”. However, many
other complementary technologies are reaching a high level
of maturity. Their interplay may dramatically shift the information
and communication technology landscape in the
following years, bringing separate technologies into a common
ground. This paper offers a comprehensive definition
of the fog, comprehending technologies as diverse as cloud,
sensor networks, peer-to-peer networks, network virtualisation
functions or configuration management techniques. We
highlight the main challenges faced by this potentially breakthrough
technology amalgamation.
Similar to EXPERIMENTAL STUDY TO MAINTAIN STABILITY IN THE CASE OF INDUSTRIAL CLOUDLETS NETWORK (20)
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Dr.Costas Sachpazis
Consolidation Settlement Calculation Program-The Python Code
By Professor Dr. Costas Sachpazis, Civil Engineer & Geologist
This program calculates the consolidation settlement for a foundation based on soil layer properties and foundation data. It allows users to input multiple soil layers and foundation characteristics to determine the total settlement.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
This is an overview of my current metallic design and engineering knowledge base built up over my professional career and two MSc degrees : - MSc in Advanced Manufacturing Technology University of Portsmouth graduated 1st May 1998, and MSc in Aircraft Engineering Cranfield University graduated 8th June 2007.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)GiselleginaGloria
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
EXPERIMENTAL STUDY TO MAINTAIN STABILITY IN THE CASE OF INDUSTRIAL CLOUDLETS NETWORK
1. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
DOI: 10.5121/ijccsa.2023.13401 1
EXPERIMENTAL STUDY TO MAINTAIN STABILITY
IN THE CASE OF INDUSTRIAL
CLOUDLETS NETWORK
Amel Ben Lazreg
Higher Institute of Computer Science and Communication Technologies of Hammam
Sousse, Prince Laboratory, Sousse University, Sousse, Tunisia
ABSTRACT
Cloud usage has increased rapidly, except when it comes to the notable integration of IOT with Industry
4.0.This study seeks to challenge the limits of Cloud uses. As a result, the integration of Cloudlet
(middleware) in some critical applications is growing rapidly with the expansion of Cloud applications.
The Cloudlet is being deployed as a necessary component in the industrial network to ensure data
synchronization, security, and stability. Based on our recent studies, this work will focus on how to
maintain stability in a Cloudlets network. In other words, the goal is to ensure that all nodes remain stable,
meaning that all the Cloudlets are connected to the Cloud and able to transmit data independently,
regardless of the constraints imposed by the industrial environment. The first part of this work is to define
the problem, discuss how Cloudlet can resolve some Cloud limits. Then, we define the stability and its
models. In effect, the experiments in a real industrial environment are presented. Finally, the results are
analysed.
KEYWORDS
Cloudlets Network, Cloud Computing, Stability, Industrial Applications, Websockets.
1. INTRODUCTION
Nowadays, every user aims to benefit from the advantages of Cloud Computing while ensuring
the data’s security and confidentiality [1] . However, the limitations of using the Cloud in certain
critical domains, especially in the industrial sector, continues to endure. These limits figure in
Service discontinuity, latency, security, data localization and availability, etc. [2]
In fact, optimising public Cloud resources necessarily requires the implementation of middleware
to minimise direct contact between the user and the public Cloud. These include:
- Making data available even when disconnected from the Cloud, given that this
middleware is equipped with several types of connection: Wi-Fi, 3G/4G, ETHERNET,
GPRS/GSM, etc. [3]
- Replicate updates requested by the user in real time, if the Cloud is available, otherwise
the most recent version of the data is retrieved. This means that the information available to the
user is the most accurate (the real information in the network).
- Maintain permanent connectivity between the user and his Cloud via a synchronous real-
time copy of the services and data allocated. [4]
- Distribution of the computing load across the various network components (Cloud and
other intelligent equipment). [5]
2. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
2
- The transfer of data and any other action carried out within the Cloudlet network requires
security and traceability. We also need to plan updates and maintenance over time. To do this, we
used the Blockchain technology. [6]
In fact, we have envisaged a hybrid solution enabling mechanisms to be implemented to ensure
the autonomous transfer of data from the user layer to the Cloud server. To realise this goal, the
industrial Cloudlet is integrated into various real applications. The installation of the Cloudlet
network has solved several problems, but the behaviour of the nodes within this network still
needs to be studied to guarantee better performance, which is the subject of this article.Therefore,
our main aim is to guarantee the stability of this cloudlet network, even if there are moments of
disconnection.
2. BACKGROUND
2.1. Embedded Cloudlet
An Industrial Cloudlet is considered a middleware layer between users and the Cloud. It provides
a unified abstraction for all requests in a distributed environment and addresses various aspects of
communication, synchronization, replication, persistence, and access control. [7]
More specifically, we will discuss an embedded Cloudlet, which is composed of both hardware
and software. A Cloudlet is an embedded system that functions as a private cloud or embedded
cloud, providing an individual user with access to the most up-to-date versions of data stored in
the cloud. It also serves as a local backup solution for businesses, ensuring data transfer and
overcoming the lack of internet coverage.
Figure 1. Embedded Cloudlet
2.2. Industrial Cloudlets Network
An Industrial Cloudlets Network (ICN) is a collection of dependable, high-capacity computers
that are securely connected to the Internet. These nodes can be accessed by nearby mobile
devices, which function as end users. Cloudlets do not need to be a fixed infrastructure close to
the wireless access point; instead, they can be dynamically formed with any device in the local
network that has available resources.
3. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
3
3. STABILITY OF A CLOUDLET NETWORK
The stability of a Cloudlet network necessarily involves verifying the stability of each individual
Cloudlet over a specific period of time [8]. To ensure the stability of a Cloudlet, it is essential to
have a consistent power supply, uninterrupted connectivity, and reliable transmission of accurate
data to the Cloud server.
According to the approach proposed by previous studies, which assumes that the acquisition of
any data should be considered essential, and whenever new data appears, it should be treated as
such. Consequently, we can deduce that the Cloudlet network will only be perfectly stable when
all nodes are connected to the Cloud and are able to transmit data independently, without being
affected by the constraints of the industrial environment.
Each Cloudlet has its own characteristics, including connection type, RAM, processing power,
and more. This allows the system to be subdivided into subsystems based on the type of
connection. These sub-networks introduce the possibility of acquiring data from various
connections and at various times.
By the deadline, during the "waiting phase," the information will be stored within the internal
system of each Cloudlet, which can result in a state of global system instability.
Let “s” be the stability coefficient of the Cloudlet network.
To determine whether a system is stable or not, we define three states:
Table 1. Types of system stability.
parameter System
s = 1 Perfectly stable
0.5 < s < 1 Moderately stable
s ≤ 0.5 Unstable system
To effectively study network stability, we have utilized the concept of entropy, which is a state
function. It can be interpreted as a measure of the degree of disorder in a system at the
microscopic level. The second principle states that any transformation of a thermodynamic
system occurs with an increase in the overall entropy, which includes the entropy of both the
system and the external environment. This implies the creation of entropy and is associated with
the impossibility of transitioning from disorder to order without external intervention.
According to Szilard [9], the entropy law allows for the quantification of information, particularly
the optimal amount of information required to make a decision about a given variable. This new
definition has attracted the attention of numerous researchers in various fields, particularly those
interested in quantifying a decision parameter related to the flow of information.
The entropy law of an information item is considered as a function of the probability of a given
random variable. It satisfies all of the following properties:
- The value of information from two events is greater than the value of information from
one event.
- If two events are independent, the value of the information resulting from these two
events is equal to the sum of their values.
- The value of information from any event is non-negative.
4. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
4
The mathematical functions that can satisfy all these properties are of the form:
Where X is a discrete random variable and x x) x .
This equation will be written in our case as follows:
Where n is the number of Cloudlets in the network
And 𝑝(𝑆𝐶𝑙𝑘) is the stability coefficient of each sub-network (per connection type)
Where m is the number of Cloudlets for that type.
Therefore, determining the entropy of each sub-network will allow measuring the “stability” of
the overall network. In other words, entropy will enable a Cloudlet network to exhibit the
behaviour of a node based on the transmitted data to and from the Cloud. In this case, the
parameter “disorder” is inversely proportional to the entropy value. That is, the network is
unstable when its entropy reaches its minimum.
4. APPLICATIONS
In order to showcase the various approaches already discussed in the preceding sections of this
paper, we conducted experiments using our contributions in different industrial settings, including
interurban and sub-Saharan industrial zones. In each case, we had to integrate the Cloudlet
component into a platform that is already based on a Cloud. We would like to draw the reader's
attention to the fact that our experiments were conducted within a highly professional framework.
These experiments were based on international invitations to tender from Tunisia, Italy, Belgium,
and Luxembourg, and were accompanied by rigorous specifications.
We took responsibility for setting up our platform to ensure a backbone of Cloudlets that are
closely integrated with the local environment. These interconnected industries, such as phosphate
production, industrial laundries, and online ordering, needed to continuously synchronize their
data with the cloud server. In fact, these interconnected industries had to operate in real time,
considering that the actors within the system utilize and manage the data during production. As a
result, these actors have to operate even when there is no internet connectivity.
To meet the specifications, we developed our industrial Cloudlet as a hardware product and
evaluated its efficacy in two major industries in Tunisia and Italy. In the remainder of this paper,
we present the results of several experiments.
The “Lavapiù” laboratories in Italy are leaders in the field of industrial laundry services. They are
best known for dry cleaning, especially delicate garments like silk, wool, lace, and cashmere.
However, the equipment needed for this type of cleaning is very complex, including large
washing machines and a high volume of customers. In fact, this group of companies utilizes the
equipment and automated machines provided by the renowned “Metalprojetti”.
5. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
5
“Metalprogetti” offers all the equipment necessary to fully automate laundry laboratories.
Previously, “Lavapiù” organized all these tasks, but the process of fulfilling customer requests
was traditional. When the customer arrived, a worker went to collect the clothes that were already
prepared. In these situations, “Lavapiù” has encountered certain problems. Sometimes, customers
arrive and their clothes are not yet ready or, due to the fault of the sales assistant, customers end
up taking other clothes. This not only wastes their time but also leads to unnecessary searching
for the correct items.
4.1. Implementation
To address these constraints, we proposed integrating the Cloudlet into the computer that contains
the laboratory management software (cash register, garment list, pricing, etc.) while associating
each customer with a unique barcode. This barcode is placed either on the customer’s loyalty card
or in their mobile application. In this case, the Cloudlet operates on a sampling period. Instead,
actions are on-demand, meaning that when the garments are ready; the automated system sends a
notification to the Cloudlet. This information is then broadcasted to the Cloud.
Consequently, the customer is notified that they can collect their garments. Upon arriving at the
laboratory, the worker scans their barcode using a reader connected to the Cloudlet station.
Subsequently, the Cloudlet records the transaction and notifies the automated system that it
requests the garments for a specific customer. This notification triggers the operation of the
automatic door, which brings the requested garments to the user.
4.2. Contribution
In the communication process explained above, we have elaborated the communication between
the Cloudlet and the Cloud at the beginning in this way.
Figure 2. Web service communication between Cloudlet and Cloud
At the beginning, we implemented a system that follows the communication depicted in Figure 2,
where the Cloudlet sends a membership request to the Cloud. The Cloud then saves a session
(Cloudlet ID, port, etc.) in the database. It subsequently checks each time whether the Cloudlet is
connected or not based on its corresponding data. In such cases, we found that the Cloudlet
disconnects multiple times without the Cloud server being aware, as it relies on outdated session
information.
To address these issues, we transformed the process into a self-verification mechanism using web
sockets, as illustrated in Figure 3.
6. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
6
Figure 3. Web service communication between Cloudlet and Cloud
Web Sockets are a protocol that provides full-duplex communication channels over a single TCP
connection. In contrast, HTTP provides half-duplex communication. The information exchange
mode of Web Sockets is bidirectional, meaning that the server can push information to the client,
which is not possible with direct HTTP communication. In our case, we utilized Web Sockets to
push realtime update messages to a Cloudlet. One of the most interesting features is that most
WebSocket libraries also support direct response to WebSocket messages from the Cloudlet,
acting as acknowledgments in the message queue.
With this verification mechanism in place, we experienced fewer disconnections and improved
connection stability. This will be further demonstrated through experiments in the following
section.
4.3. Experimentations and Results
We installed Cloudlets in several industrial laundry and dry cleaning agencies, each with an
appropriate type of connection (4G, Wi-Fi, Ethernet). During the installation of the Cloudlets
using only web services (HTTP), we observed the following results. We implemented the upward
communication (from the Cloudlet to the Cloud) in cases where the Cloudlet was connected via
Wi-Fi and 4G.
As discussed in the connection request model, we relied on two approaches. The first approach
was the standard one, where the Cloud contains a process which checked whether the Cloudlet
was connected or not. The second approach involved self-verification by the Cloudlet itself. In
this case, the Cloudlet checked its status (Connected/Disconnected) in relation to the Cloud at
each sampling period (every 6 seconds).
We calculated the number of disconnections during a selected test period and computed the
probability every 5 minutes.
Where 𝑛𝑐𝑥 is the number of successful connections to the cloud server.
And nT is the number of total connection attempts. As the industrial Cloudlet is an embedded
system with limited memory resources, so we thought of recording in the Cloudlet log file to save
the disconnection attempts.
7. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
7
Hence
Where 𝑛𝑑𝑥is the number of disconnection times (failed connection attempt with the Cloud
server).
These are some results of Log files of installed Cloudlet in the network that are considered as
entries of mentioned results.
Figure 4. Log File in Cloudlet
When Cloudlet sends data to the Cloud server, it records the status of its connection in a log file.
As the connection parameter is fundamental to the study of stability, the number of disconnection
times is considered an important factor in the stability of Cloudlet.
Figure 5. Log File in Cloudlet
8. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
8
In a Cloudlet network, the Cloud server saves all the states of the associated Cloudlets to give an
overall view of the stability of its nodes.
Below are the results of the probabilities for Cloudlets connected in 4 G and Wi-Fi.
Figure 6. Probability of connection via 4G (Without verification)
In the case of 4G communication in a network consisting of 5 Cloudlets without self-verification
by the Cloudlet, we observed that after an average time of 13 minutes, the probability of the
network being connected converges to 1.
For this type of communication, the maximum upstream throughput varies between 21.69 and
28.18 Mbit/s, and the downstream throughput ranges from 48.72 to 87.09 Mbit/s. The time from
initialization to network stability can be considered as the system’s warm-up time or may be due
to real-world conditions.
As mentioned before, we did not work with a simulator to achieve perfect conditions from the
beginning of the experiment. The same stabilization duration is sufficient for the 4G system with
Cloudlet self-verification.
Figure 7. Probability of connection via 4G (With verification)
9. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
9
To see the degree of connection optimisation with the self-checking module in the Cloudlet
network, we calculate the optimisation coefficient
In the case of the 4G Cloudlet network, we got 𝛼 = 1- 0.926= 0.074. We conclude that the
cloudlet network with cloudlet verification optimized the probability of connection to the cloud
server by 7.4
By testing the same experiments with the Cloudlet network via Wi-Fi, we got these probability
results.
Figure 8. Probability of connection via Wi-Fi (Without verification)
The Wi-Fi network without verification takes an initialization period of almost 8 minutes.
Figure 9. Probability of connection via Wi-Fi (With verification)
In the case of self-verification of a Wi-Fi connection where the throughput varies between 1.6 and
3.97 Mbit/s (low throughput, but these are the actual conditions of this laboratory in ViaLarga),
we obtained 𝛼 = 1 - 0.9673 = 0.032.
10. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
10
Given the linearity of the system, each state depends on the previous state and influences the
following state. This is referred to as a memory system. Hence, the calculation of cumulative
entropy imposes that over time, the system learns from connection states, which gradually
increases the probability of connection. We highlighted the progression of entropies through the
accumulation of k in this equation
H(RCl)=
In fact, as if we have divided the large system into subsystems of the network. Below are the
cumulative entropy curves for the same networks studied before.
Figure 10. Entropy of connection via Wi-Fi (Without verification)
Figure 11. Entropy of connection via 4G (With verification)
For example, in the case of cumulative linear entropy of the 4G network with self-verification,
which is the most suitable combination for data transfer in industrial environments, we observe
that the system is unstable for the first 7 minutes after the process launch. Then it becomes
moderately stable for about an hour, and finally, it maintains a high level of stability, reaching an
H stability value of 0.94
11. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 13, No. 3/4, August 2023
11
5. CONCLUSIONS
In conclusion, these experiments have demonstrated the necessity of the Cloudlet component for
data synchronization and optimization of data transmission. Integrating a Cloudlet layer has
provided more opportunities to share the workload of the Cloud server and allow users to have
their data readily available. This is a crucial parameter, as in the event of a failure or malfunction,
the production process can continue without disruption (the Cloudlets replace the Cloud). In other
cases, the Cloudlets serve as communication relays between themselves and between the end user
and the Cloud. Basing on the stability of Industrial Cloudlet Network, we recommend to accord
the 4G communication to the Cloudlet then Wi-Fi tom maintain more stability. The cost
effectiveness of using Cloudlets is impeccable, as the aforementioned experiments have shown
that equipping a network with a Cloudlet can significantly improve execution time and system
responsiveness as a whole.
ACKNOWLEDGEMENTS
The author would like to thank EDUCANET Tunisian Company and La Milù for their support
and for the opportunity; they gave me to carry out these experiments.
REFERENCES
[1] Kenji E. Kushida, Jonathan Murray,John Zysman, (2011) “Diffusing the Cloud: Cloud Computing
and Implications for Public Policy”, Journal of Industry, Competition and Trade, Vol. 11, pp 209–
237
[2] Arooj Hassan, Sabeen Hussain Bhatti, Sobia Shujaat, Yujong Hwang (2022) “To adopt or not to
adopt? The determinants of cloud computing adoption in information technology sector”, Decision
Analytics Journal, Vol.5
[3] Amel Ben Lazreg, Anis Ben Arbia, Habib Youssef, "A Synchronized Offline Cloudlet
Architecture," ICEMIS, The International Conference on Engineering& MIS 2017. Monastir
May 2017.
[4] Amel Ben Lazreg, Dhafer Ben Arbia, Anis Ben Arbia, Habib Youssef, " A Novel Cloudlet-based
[5] Communication Framework for Resource-Constrained Devices," DATA’18,International
Conference on Data Science, E-learning and Information Systems 2018. Madrid Octobre 2018.
[6] Amel Ben Lazreg, Anis Ben Arbia, Habib Youssef, “A Distributed Decision Making Model For
Cloudlets Network: A Fog To Cloud Computing Approach," AINA, The 34th International
Conference on Advanced Information Networking and Applications 2020. Springer Book
“Advanced Information Networking and Applications” pp.1126-1137
[7] Amel Ben Lazreg, Anis Ben Arbia, Habib Youssef, "Cloudlet-Cloud Network Communication
Based on Blockchain Technology," ICOIN 2020, The 34th International Conference on
Information Networking 2020. Barcelone Janvier 2020.
[8] E. Koukoumidis, D. Lymberopoulos, K. Strauss, J. Liu, and D. Burger, (2012) “Pocket Cloudlets,”
ACM SIGPLAN Notices, vol. 47, no. 4, pp. 171– 184
[9] Jannik Hahn, Olaf Stursberg, (2022) On Stability of Network Control Systems with Switching
Transmission Probabilities, IFAC-PapersOnLine, Volume 55, Issue 13, Pages 276-281
[10] Parrondo, J.M.R. The Szilard engine revisited: Entropy, macroscopic randomness, and symmetry
breaking phase transitions. Chaos 2001, 11, 725–733.
AUTHOR
Doctor in Sciences Computer, IT engineer, Completed her Ph.D from the Higher Institute
of Computer Science and Communication Technologies of Hammam Sousse, University
of Sousse , Tunisia. Her research interests include the distributed systems, Cloud
Computing and Blockchain. Actually, she is university teacher in the same organization