Please use this identifier to cite or link to this item:
http://dspace.iitrpr.ac.in:8080/xmlui/handle/123456789/3925
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, A. | - |
dc.contributor.author | Auluck, N. | - |
dc.contributor.author | Rana, O. | - |
dc.contributor.author | Nepal, S. | - |
dc.date.accessioned | 2022-08-26T15:44:44Z | - |
dc.date.available | 2022-08-26T15:44:44Z | - |
dc.date.issued | 2022-08-26 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/3925 | - |
dc.description.abstract | Fog computing extends the capability of cloud services to support latency sensitive applications. Adding fog computing nodes in proximity to a data generation/ actuation source can support data analysis tasks that have stringent deadline constraints. We introduce a real time, security-aware scheduling algorithm that can execute over a fog environment [1 , 2]. The applications we consider comprise of: (i) interactive applications which are less compute intensive, but require faster response time; (ii) computationally intensive batch applications which can tolerate some delay in execution. From a security perspective, applications are divided into three categories: public, private and semi-private which must be hosted over trusted, semi-trusted and untrusted resources. We propose the architecture and implementation of a distributed orchestrator for fog computing, able to combine task requirements (both performance and security) and resource properties. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Scheduling real time security aware tasks in fog networks | en_US |
dc.type | Article | en_US |
Appears in Collections: | Year-2021 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Full Text.pdf | 3.61 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.