Blockchain-based security model for efficient data transmission and storage in cloudlet network resource environment.
dc.contributor.advisor | Ezugwu, Absalom El-Shamir. | |
dc.contributor.author | Masango, Nothile Clementine. | |
dc.date.accessioned | 2023-11-06T17:45:53Z | |
dc.date.available | 2023-11-06T17:45:53Z | |
dc.date.created | 2023 | |
dc.date.issued | 2023 | |
dc.description | Masters Degree. University of KwaZulu-Natal, Durban. | en_US |
dc.description.abstract | As mobile users’ service requirement increases, applications such as online games, virtual reality, and augmented reality demand for more computation power. However, the current design of mobile devices and their associated innovations cannot accommodate such applications because of the limitations they have in terms storage, computing power and battery life. Therefore, as a result, mobile devices offload their tasks to the remote cloud environments. Moreover, due to the architecture of cloud computing, where cloud is located at the core of the network, applications experiences challenges such as latency. This is a disadvantage to real-time online applications. Hence, the edge computing based cloudlet environment was introduced to bring resources closer to the end user, with an enhanced network quality of service. Although there is merit in deploying cloudlets at the edge of the network, which is closer to the user, this makes them susceptible to attacks. For this newly introduced technology to be fully adopted, effective security measures need to be incorporated into the current cloudlets computing platform. This study proposes blockchain technology as a security model in securing the data shared between mobile devices and cloudlet, with an agent layer concept introduced in between mobile device layer and cloudlet. The implemented agent-based model uses the new consensus mechanism, proof of trust where trust and experience is determine by the number of coins each node (cloudlet) possess, to select two miners. These miners participate in message verification using Elliptic curve scheme, and if they do not reach consensus, a third miner is selected to resolve the conflict. Any miner with wrong verification loses all the coins; in this way trust and experience is controlled. This proposed solution has proven to be more efficient in terms of security and network performance in comparison to existing state-of-the-arts implementations. | en_US |
dc.identifier.uri | https://researchspace.ukzn.ac.za/handle/10413/22501 | |
dc.language.iso | en | en_US |
dc.subject.other | Mobile devices. | en_US |
dc.subject.other | Remote cloud environments. | en_US |
dc.subject.other | Cloud computing. | en_US |
dc.title | Blockchain-based security model for efficient data transmission and storage in cloudlet network resource environment. | en_US |
dc.type | Thesis | en_US |