Load balancing of fog computing centre and its security using elliptic curve cryptography

2020 ◽  
Vol 3 (3/4) ◽  
pp. 245
Author(s):  
Yogita Pagar ◽  
Dilip Rathod ◽  
Girish Chowdhary
2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Abdulrahman Alamer

PurposeEmploying a fog computing (FC) network system in the robotic network system is an effective solution to support robotic application issues. The interconnection between robotic devices through an FC network can be referred as the Internet of Robotic Things (IoRT). Although the FC network system can provide number of services closer to IoRT devices, it still faces significant challenges including real-time tracing services and a secure tracing services. Therefore, this paper aims to provide a tracking mobile robot devices in a secure and private manner, with high efficiency performance, is considered essential to ensuring the success of IoRT network applications.Design/methodology/approachThis paper proposes a secure anonymous tracing (SAT) method to support the tracing of IoRT devices through a FC network system based on the Counting Bloom filter (CBF) and elliptic curve cryptography techniques. With the proposed SAT mechanism, a fog node can trace a particular robot device in a secure manner, which means that the fog node can provide a service to a particular robot device without revealing any private data such as the device's identity or location.FindingsAnalysis shows that the SAT mechanism is both efficient and resilient against tracing attacks. Simulation results are provided to show that the proposed mechanism is beneficial to support IoRT applications over an FC network system.Originality/valueThis paper represents a SAT method based on CBF and elliptic curve cryptography techniques as an efficient mechanism that is resilient against tracing attacks.


Author(s):  
Kazuki NAGANUMA ◽  
Takashi SUZUKI ◽  
Hiroyuki TSUJI ◽  
Tomoaki KIMURA

Author(s):  
Mohd Javed ◽  
Khaleel Ahmad ◽  
Ahmad Talha Siddiqui

WiMAX is the innovation and upgradation of 802.16 benchmarks given by IEEE. It has numerous remarkable qualities, for example, high information rate, the nature of the service, versatility, security and portability putting it heads and shoulder over the current advancements like broadband link, DSL and remote systems. Though like its competitors the concern for security remains mandatory. Since the remote medium is accessible to call, the assailants can undoubtedly get into the system, making the powerless against the client. Many modern confirmations and encryption methods have been installed into WiMAX; however, regardless it opens with up different dangers. In this paper, we proposed Elliptic curve Cryptography based on Cellular Automata (EC3A) for encryption and decryption the message for improving the WiMAX security


Author(s):  
Istabraq M. Al-Joboury ◽  
Emad H. Al-Hemiary

Fog Computing is a new concept made by Cisco to provide same functionalities of Cloud Computing but near to Things to enhance performance such as reduce delay and response time. Packet loss may occur on single Fog server over a huge number of messages from Things because of several factors like limited bandwidth and capacity of queues in server. In this paper, Internet of Things based Fog-to-Cloud architecture is proposed to solve the problem of packet loss on Fog server using Load Balancing and virtualization. The architecture consists of 5 layers, namely: Things, gateway, Fog, Cloud, and application. Fog layer is virtualized to specified number of Fog servers using Graphical Network Simulator-3 and VirtualBox on local physical server. Server Load Balancing router is configured to distribute the huge traffic in Weighted Round Robin technique using Message Queue Telemetry Transport protocol. Then, maximum message from Fog layer are selected and sent to Cloud layer and the rest of messages are deleted within 1 hour using our proposed Data-in-Motion technique for storage, processing, and monitoring of messages. Thus, improving the performance of the Fog layer for storage and processing of messages, as well as reducing the packet loss to half and increasing throughput to 4 times than using single Fog server.


Sign in / Sign up

Export Citation Format

Share Document