University of Twente Student Theses
Link Vulnerability Aware Task Deployment over Edge and Cloud
Assaad, Malek (2022) Link Vulnerability Aware Task Deployment over Edge and Cloud.
PDF
586kB |
Abstract: | Most applications of IoT are bounded by constraints such as latency, processing capacity and security. When an IoT device cannot meet the constraints of an application, the work may be offloaded to more capable systems such as the cloud or edge nodes. There exist many solutions to this problem, solved with graph theory, machine learning or artificial intelligence but they lack depth when it comes to security while deciding the deployment point. This research aims to provide an algorithm for where to deploy an application, to the edge or the cloud, while respecting the constraints and taking advantage of heterogeneous encryption schemes. It also discusses the benefits and costs of the security aware solution. The paper arrives at a successful solution that utilizes graph theory that allows nodes to change the encryption scheme of data to secure it while it passes over vulnerable links. The solution has compromises, especially in time to compute as networks get larger. |
Item Type: | Essay (Bachelor) |
Faculty: | EEMCS: Electrical Engineering, Mathematics and Computer Science |
Subject: | 54 computer science |
Programme: | Computer Science BSc (56964) |
Link to this item: | https://purl.utwente.nl/essays/91646 |
Export this item as: | BibTeX EndNote HTML Citation Reference Manager |
Repository Staff Only: item control page