Main Reference PaperAn approach for the secure management of hybrid cloud–edge environments, Future Generation Computer Systems, 2018 [Java].
  • A secure Cloud-to-Edge environment for seamless management of IoT applications is necessary. The realization of a performing and secure Cloud-to-Edge middleware solution is a very strategic goal for future business CoT services. Thus, it needs to be deeply investigated, as highlighted by the Cloud Security Alliance (CSA). A valuable approach to develop an efficient Cloud-to-Edge system is based on an instant-message communication solution. In current Cloud environments, a Message Oriented Middleware (MOM) based on an Instant Message Protocol (IMP) provides good performance, but overlook security requirements. So to overcome such a gap following the CSA guidelines and it analyzes a real case of study considering a MOM architectural model.

+ Description
  • A secure Cloud-to-Edge environment for seamless management of IoT applications is necessary. The realization of a performing and secure Cloud-to-Edge middleware solution is a very strategic goal for future business CoT services. Thus, it needs to be deeply investigated, as highlighted by the Cloud Security Alliance (CSA). A valuable approach to develop an efficient Cloud-to-Edge system is based on an instant-message communication solution. In current Cloud environments, a Message Oriented Middleware (MOM) based on an Instant Message Protocol (IMP) provides good performance, but overlook security requirements. So to overcome such a gap following the CSA guidelines and it analyzes a real case of study considering a MOM architectural model.

  • To achieve data confidentiality, integrity, authenticity, and non-repudiation.

+ Aim & Objectives
  • To achieve data confidentiality, integrity, authenticity, and non-repudiation.

  • Digital Identity Management, Digital signature, and Digital encryption can be considered to provide secure communications between cloud and edge layers.

+ Contribution
  • Digital Identity Management, Digital signature, and Digital encryption can be considered to provide secure communications between cloud and edge layers.

  • Java Development Kit 1.8.0, MySQL 5.5.40

  • EdgeCloudSim, Netbeans8.0.1, J2SE.

+ Software Tools & Technologies
  • Java Development Kit 1.8.0, MySQL 5.5.40

  • EdgeCloudSim, Netbeans8.0.1, J2SE.

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit