Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System

Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System

Rajaguru D., Puviyarasi T., Vengattaraman T.
Copyright: © 2017 |Volume: 8 |Issue: 4 |Pages: 10
ISSN: 1947-9158|EISSN: 1947-9166|EISBN13: 9781522513445|DOI: 10.4018/IJHCR.2017100103
Cite Article Cite Article

MLA

Rajaguru D., et al. "Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System." IJHCR vol.8, no.4 2017: pp.30-39. http://doi.org/10.4018/IJHCR.2017100103

APA

Rajaguru D., Puviyarasi T., & Vengattaraman T. (2017). Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System. International Journal of Handheld Computing Research (IJHCR), 8(4), 30-39. http://doi.org/10.4018/IJHCR.2017100103

Chicago

Rajaguru D., Puviyarasi T., and Vengattaraman T. "Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System," International Journal of Handheld Computing Research (IJHCR) 8, no.4: 30-39. http://doi.org/10.4018/IJHCR.2017100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article lights the need for the identification of resource elasticity in handheld edge computing systems and its related issues. Under a few developing application situations, for example, in urban areas, operational checking of huge foundations, wearable help, and the Internet of Things, nonstop information streams must be prepared under short postponements. A few arrangements, including various programming motors, have been created for handling unbounded information streams in an adaptive and productive way. As of late, designs have been proposed to utilize edge processing for information stream handling. This article reviews the cutting-edge stream preparing motors and systems for misusing asset versatility which highlights distributed computing in stream preparation. Asset flexibility takes into consideration an application or administration to scale out/in as per fluctuating requests. Flexibility turns out to be much more difficult in conveyed conditions involving edge and distributed computing assets. Device security is one of the real difficulties for fruitful execution of the Internet of Things and fog figuring conditions in the current IT space. Specialists and information technology (IT) associations have investigated numerous answers for shield frameworks from unauthenticated device assaults. Fog registering utilizes organize devices (e.g. switch, switch and center) for dormancy mindful handling of gathered information utilizing IoT. This article concludes with the various process for improvising the resource elasticity of handheld devices for leading the communication to the next stage of computing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.