Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System

Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System

Rajaguru D., Puviyarasi T., Vengattaraman T.
Copyright: © 2017 |Pages: 10
DOI: 10.4018/IJHCR.2017100103
(Individual Articles)
No Current Special Offers


This article lights the need for the identification of resource elasticity in handheld edge computing systems and its related issues. Under a few developing application situations, for example, in urban areas, operational checking of huge foundations, wearable help, and the Internet of Things, nonstop information streams must be prepared under short postponements. A few arrangements, including various programming motors, have been created for handling unbounded information streams in an adaptive and productive way. As of late, designs have been proposed to utilize edge processing for information stream handling. This article reviews the cutting-edge stream preparing motors and systems for misusing asset versatility which highlights distributed computing in stream preparation. Asset flexibility takes into consideration an application or administration to scale out/in as per fluctuating requests. Flexibility turns out to be much more difficult in conveyed conditions involving edge and distributed computing assets. Device security is one of the real difficulties for fruitful execution of the Internet of Things and fog figuring conditions in the current IT space. Specialists and information technology (IT) associations have investigated numerous answers for shield frameworks from unauthenticated device assaults. Fog registering utilizes organize devices (e.g. switch, switch and center) for dormancy mindful handling of gathered information utilizing IoT. This article concludes with the various process for improvising the resource elasticity of handheld devices for leading the communication to the next stage of computing.
Article Preview

Data Stream Identification Process For Handheld Devices

In fog registering, for any occasion of time same edge device can be utilized by various keen applications with distinctive arrangement of clients which raises the issue of security of edge device. In the event that edge device is hacked, it can get false information what's more, give false yield information, detail awful outcomes which can influence the execution of entire application. Hacked device can likewise be utilized to impart information and results to focused organizations or radical gatherings associated with undesirable exercises (Montejano & Sau, n.d.).

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing