EFFICIENT AND SECURE DATA UTILIZATION IN MOBILE EDGE COMPUTING BY DATA REPLICATION
PDF

How to Cite

Bhalaji, N. 2020. “EFFICIENT AND SECURE DATA UTILIZATION IN MOBILE EDGE COMPUTING BY DATA REPLICATION”. Journal of ISMAC 2 (1): 1-12. https://doi.org/10.36548/jismac.2020.1.001.

Keywords

— Data Replication (duplication)
— Cloud Computing
— Edge Computing
— Mobile Edge Computing
— Internet of Things
Published: 25-02-2020

Abstract

The technological improvement at a rapid pace in the information and the communication fields has made the internet of things inevitable in our day today activities and takes a significant role in the every part of our regular schedule. The seamless communication through the internet of things is made possible, by connecting the tangible things around resulting in the numerous of advantages such as timely information delivery, servicing and monitoring. The inbuilt benefits of the IOT has made it more prominent among a wide range of application resulting in a huge data flow, though the congestion in the dataflow are managed using the cloud computing and the alternative sources such as the edge computing , the security of the data that are used are still under research. To manage the huge data flow and have secure data utilization in the internet of things, the paper has put forth the mobile edge computing integrated with the data duplication process taking into consideration the power utilization and the response time. The proposed method is simulated using the Network Simulator-2 and results obtained shows that the duplication process provides an enhancement in the bandwidth utilization along with the cut down in the power consumption and the response time.

References

  1. Bestak, Robert, and S. Smys. "BIG DATA ANALYTICS FOR SMART CLOUD-FOG BASED APPLICATIONS." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 02 (2019): 74-83.
  2. Kumar, R. Praveen, and S. Smys. "A novel report on architecture, protocols and applications in Internet of Things (IoT)." In 2018 2nd International Conference on Inventive Systems and control (ICISC), pp. 1156-1161. IEEE, 2018.
  3. Smys, S., and Jennifer S. Raj. "A STOCHASTIC MOBILE DATA TRAFFIC MODEL FOR VEHICULAR AD HOC NETWORKS." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 55-63.
  4. Karunakaran, V. "A STOCHASTIC DEVELOPMENT OF CLOUD COMPUTING BASED TASK SCHEDULING ALGORITHM." Journal of Soft Computing Paradigm (JSCP) 1, no. 01 (2019): 41-48.
  5. Bhalaji, N. "DELAY DIMINISHED EFFICIENT TASK SCHEDULING AND ALLOCATION FOR HETEROGENEOUS CLOUD ENVIRONMENT." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 01 (2019): 51-62.
  6. Abbas, Nasir, Yan Zhang, Amir Taherkordi, and Tor Skeie. "Mobile edge computing: A survey." IEEE Internet of Things Journal 5, no. 1 (2017): 450-465.
  7. Harikumar, R., and Jennifer S. Raj. "Ad hoc node connectivity improvement analysis–Why not through mesh clients?." Computers & Electrical Engineering 40, no. 2 (2014): 473-483.
  8. Roman, Rodrigo, Javier Lopez, and Masahiro Mambo. "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges." Future Generation Computer Systems 78 (2018): 680-698.
  9. Yu, Wei, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and Xinyu Yang. "A survey on the edge computing for the Internet of Things." IEEE access 6 (2017): 6900-6919.
  10. Zhang, Ke, Supeng Leng, Yejun He, Sabita Maharjan, and Yan Zhang. "Mobile edge computing and networking for green and low-latency Internet of Things." IEEE Communications Magazine 56, no. 5 (2018): 39-45.
  11. Tiwary, Mayank, Deepak Puthal, Kshira Sagar Sahoo, Bibhudatta Sahoo, and Laurence T. Yang. "Response time optimization for cloudlets in Mobile Edge Computing." Journal of Parallel and Distributed Computing 119 (2018): 81-91.
  12. Sridhar, S., and S. Smys. "Intelligent security framework for iot devices cryptography based end-to-end security architecture." In 2017 International Conference on Inventive Systems and Control (ICISC), pp. 1-5. IEEE, 2017.
  13. Sharnya, P., and Jennifer S. Raj. "Self organizing wireless mesh network." International Journal of Innovation and Applied Studies 3, no. 2 (2013): 486-492.
  14. Sultana, Ajmery, Lian Zhao, and Xavier Fernando. "Efficient resource allocation in device-to-device communication using cognitive radio technology." IEEE Transactions on Vehicular Technology 66, no. 11 (2017): 10024-10034.
  15. Shi, Yong, and Kai Qian. "LBMM: a load balancing based task scheduling algorithm for cloud." In Future of Information and Communication Conference, pp. 706-712. Springer, Cham, 2019.
  16. Fan, Xiying, Chuanhe Huang, Junyu Zhu, and Bin Fu. "R-DRA: a replication-based distributed randomized algorithm for data dissemination in connected vehicular networks." Wireless Networks 25, no. 7 (2019): 3767-3782.
  17. Wahid, Mohammed Nazeh Abdul, Abdulrahman Ali, Babak Esparham, and Mohamed Marwan. "A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention." Journal Computer Science Applications and Information Technology 3 (2018): 1-7.
  18. Wu, Xiuguo. "Combination Replicas Placements Strategy for Data sets from Cost-effective View in the Cloud." International Journal of Computational Intelligence Systems 10, no. 1 (2017): 521-539.
  19. Mazumdar, Somnath, Daniel Seybold, Kyriakos Kritikos, and Yiannis Verginadis. "A survey on data storage and placement methodologies for cloud-big data ecosystem." Journal of Big Data 6, no. 1 (2019): 15.
  20. Tos, Uras. "Data replication in large-scale data management systems." PhD diss., 2017.
  21. Hara, Takahiro. "Effective replica allocation in ad hoc networks for improving data accessibility." In Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No. 01CH37213), vol. 3, pp. 1568-1576. IEEE, 2001.