University of Twente Student Theses

Login

Link Vulnerability Aware Task Deployment over Edge and Cloud

Assaad, Malek (2022) Link Vulnerability Aware Task Deployment over Edge and Cloud.

[img] PDF
586kB
Abstract:Most applications of IoT are bounded by constraints such as latency, processing capacity and security. When an IoT device cannot meet the constraints of an application, the work may be offloaded to more capable systems such as the cloud or edge nodes. There exist many solutions to this problem, solved with graph theory, machine learning or artificial intelligence but they lack depth when it comes to security while deciding the deployment point. This research aims to provide an algorithm for where to deploy an application, to the edge or the cloud, while respecting the constraints and taking advantage of heterogeneous encryption schemes. It also discusses the benefits and costs of the security aware solution. The paper arrives at a successful solution that utilizes graph theory that allows nodes to change the encryption scheme of data to secure it while it passes over vulnerable links. The solution has compromises, especially in time to compute as networks get larger.
Item Type:Essay (Bachelor)
Faculty:EEMCS: Electrical Engineering, Mathematics and Computer Science
Subject:54 computer science
Programme:Computer Science BSc (56964)
Link to this item:https://purl.utwente.nl/essays/91646
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page