Secure and Scalable Collaborative Edge Computing using Decision Tree

Deepak Puthal, Ernesto Damiani, Saraju P. Mohanty

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

Edge computing is an essential step of an IoT-Edge workflow, where the Internet of Things (IoT) devices sense or collect the data, and data are processed and evaluated at the edge data centers (EDCs) for near real-time evaluation. Further, data are processed in the resource-rich Cloud environment. It is always challenging to filter out the corrupted data at the resource-constrained EDCs. To address this challenge, we proposed a method to create a collaborative edge computing environment and apply the Decision Tree (DT) to filter out the corrupted data and make the intact data available for data processing. Secondly, we developed a Decision Tree-based authentication mechanism to strengthen the Proof-of-Authentication (PoAh) process for seamless integration of Blockchain in IoT-Edge secure end-to-end data transmission. Finally, we have experimented in a real-time testbed to validate both the proposed approaches.

Original languageBritish English
Title of host publicationProceedings - 2022 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2022
PublisherIEEE Computer Society
Pages247-252
Number of pages6
ISBN (Electronic)9781665466059
DOIs
StatePublished - 2022
Event2022 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2022 - Pafos, Cyprus
Duration: 4 Jul 20226 Jul 2022

Publication series

NameProceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI
Volume2022-July
ISSN (Print)2159-3469
ISSN (Electronic)2159-3477

Conference

Conference2022 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2022
Country/TerritoryCyprus
CityPafos
Period4/07/226/07/22

Keywords

  • Blockchain
  • Collaborative Edge Computing
  • Data Filtration
  • Decision Tree
  • IoT-Edge Workflow

Fingerprint

Dive into the research topics of 'Secure and Scalable Collaborative Edge Computing using Decision Tree'. Together they form a unique fingerprint.

Cite this