Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Middleware Frameworks for Mobile Cloud Computing, Internet of Things and Cloud of Things: A Review
    (Springer, 2020) Debbarma, T.; Chandrasekaran, K.
    Mobile cloud computing (MCC) is an extension of cloud computing (CC) technologies. It provides seamless access of different cloud services to smart mobile devices (SMDs). There is no denying that CC can be scaled to a great extent in terms of computing, storage and other services, but the SMDs used for accessing those services are limited on battery capacity, storage and computing power due to their small form factors. The limitations of SMDs can be minimised/resolved by using MCC platforms. Though MCC is advantageous in many ways, it has its own inherent challenges and issues due to the heterogeneous hardware and software platforms used by SMDs and CC platforms, which makes it difficult to have interoperable services and the development of applications for those devices. This paper studied recently (from 2012 onwards) proposed/developed middlewares for the Internet of things (IoT), cloud of things (CoT), context-aware middlewares (CaMs) and mobile cloud middlewares (MCMs). Different middleware architectures are chosen, as in many cases, these technologies converge in terms of features, functions and services they provide. The study finds that the present middlewares lack in providing an integrated solution that complies with interoperability, portability, adaptability, context awareness, security and privacy, service discovery, fault tolerance requirements. At the end of the paper, the challenges pertaining to achieve portability, interoperability, context awareness, security are discussed and identify the gaps in the existing approaches in MCC interoperability and context adaptability. © 2020, Springer Nature Singapore Pte Ltd.
  • Item
    A Security Approach to Build a Trustworthy Ubiquitous Learning System
    (Institute of Electrical and Electronics Engineers Inc., 2020) Samyama Gunjal, S.G.; Swamy, S.C.
    Modern learning systems, say a tutoring platform, has many characteristics like digital data presentation with interactivity, mobility, which provides information about the study-content as per the learners understanding levels, intelligent learners behavior, etc. A sophisticated ubiquitous learner system maintains security and monitors the mischievous behavior of the learner, and authenticates and authorizes every learner, which is quintessential. Some of the existing security schemes aim only at single entry-point authentication, which may not suit to ubiquitous tutor platform. We propose a secured authentication scheme which is based on the information utility of the learner. Whenever a learner moves into a tutor platform, which has ubiquitous learner system technology, the system at first-begins with learners' identity authentication, and then it initiates trust evaluation after the successful authentication of the learner. Periodic credential verification of the learner will be carried out, which intensifies the authentication scheme of the system proposed. BAN logic has been used to prove the authentication in this system. The proposed authentication scheme has been simulated and analyzed for the indoor tutor platform environment. © 2020 IEEE.