IEEE Paper Template in A4 (V1) 1 | P a g e School of Computing and Mathematics Faculty of Business, Justice and Behavioural Sciences Security and Privacy Issues in Cloud and Fog Domain Student Name –...

1 answer below »
Files are uploaded. Please confirm can i get this by Friday? and how much will it cost?


IEEE Paper Template in A4 (V1) 1 | P a g e School of Computing and Mathematics Faculty of Business, Justice and Behavioural Sciences Security and Privacy Issues in Cloud and Fog Domain Student Name – Student ID Masters in IT – Networking [email protected] ABSTRACT (10 marks) – 300-400 words - What? (50 words). Discuss the issues in both the cloud and the fog domain. The issues in the cloud domain include .... The issues in the fog domain include... The research assignment focusses on x, y and z. Why (Importance) Keywords— cloud, fog, etc (THIS IS JUST A HELP FILE; YOUR ASSIGNMENT SUBTOPICS WOULD CHANGE DEPENDING ON YOUR TOPIC ALSO LOOK AT TYPICAL IEEE PAPERS FOR STYLE ETC) 1. INTRODUCTION (15 marks) Two to three paragraphs (1 page) Section 1. Background. ... Section 2. ... Section 3 etc 2. BACKGROUND/LITERATURE REVIEW (about 3 pages) (40 marks for section) Literature review (Background studies) 2.1 Cloud Domain (example only) 2.1.1 Hidden Channel Attack 1 paragraph with diagrams where possible 2.1.2 Data Plane Attack 2.1.3 Control Plane Attack 2.1.4 2.2 Fog Domain 2.2.1 Authentication and Trust Issues 3. SOLUTIONS/FINDINGS/RECOMMENDATIONS (about 2 pages) (15 marks for section) 3.1 abc 3.2 def 3.3 xyz 4. CONCLUSION AND FUTURE RESEARCH (10 marks) 5. REFERENCES (10 marks, includes marks for overall Presentation) APA6 referencing A. Page Layout Short paper. Your paper must use a page size corresponding to A4 which is 210mm wide and 297mm long. The margins must be set as follows: • Top = 19mm • Bottom = 43mm • Left = Right = 14.3mm Your paper must be in a two-column format with a space of 4.2mm between columns. All paragraphs must be indented. All paragraphs must be justified, i.e. both left-justified and right-justified. B. Text Font of Entire Document The entire document should be in Times New Roman or Times font. Type 3 fonts must NOT be used. Other font types may be used if needed for special purposes. Recommended font sizes are shown in Table 1. C. Title and Author Details Title must be in 24pt Regular font. Author name must be in 11pt Regular font. Author affiliation must be in 10pt Italic. Email address must be in 9pt Courier Regular font. TABLE I FONT SIZES FOR PAPERS Font Size Appearance (in Time New Roman or Times) Regular Bold Italic 8 Table caption (in Small Caps), figure caption, reference item reference item (partial) 9 Author email address (in Courier), cell in a table Abstract body Abstract heading (also in Bold) 10 Level-1 heading (in Small Caps), paragraph Level-2 heading, level-3 heading, author affiliation 11 Author name 24 Title All title and author details must be in single-column format and must be centred. Every word in a title must be capitalised except for short minor words such as “a”, “an”, “and”, “as”, “at”, “by”, “for”, “from”, “if”, “in”, “into”, “on”, “or”, “of”, “the”, “to”, “with”. Author details must not show any professional title (e.g. Managing Director), any academic title (e.g. Dr.) or any membership of any professional organization (e.g. Senior Member IEEE). To avoid confusion, the family name must be written as the last part of each author name (e.g. John A.K. Smith). D. Content 2 | P a g e School of Computing and Mathematics Faculty of Business, Justice and Behavioural Sciences The abstract should give a clear indication of the objectives, scope, results and conclusion of your work. It is recommended to have at least five references. E. Figures and Tables One figure and one table can be included in your short paper. Figures and tables must be centred in the column. Large figures and tables may span across both columns. Any table or figure that takes up more than 1 column width must be positioned either at the top or at the bottom of the page. Graphics may be full colour. All colours will be retained on the PDF. Graphics must not use stipple fill patterns because they may not be reproduced properly. Please use only SOLID FILL colours which contrast well both on screen and on a black-and-white hardcopy, as shown in Fig. 1. Fig. 1 A sample line graph using colours which contrast well both on screen and on a black-and-white hardcopy ACKNOWLEDGEMENT The original version of this template was provided by Causal Productions (http://www.causalproductions.com). Most of the formatting instructions in this document have been compiled by Causal Productions from the IEEE LaTeX style files, and modified to suit this assignment. REFERENCES APA7 Referencing Format with in-text citations - See the CSU Manual and Tool at: (http://student.csu.edu.au/library/integrity) List all bibliographical references in 9-point Times New Roman, single-spaced, at the end of your paper in alphabetical order. When cited in-text, enclose in round brackets eg (Jacobs & Bean, 1963, p. 271). Websites can be cited (Ogilvie, n.d., para. 5), where n.d. means "no date" if it can't be found. If an author can't be found either (“Effects of Global Warming,” n.d., para. 3), then just use the title. Technical reports (NSW Department of Health, 2013, para. 2) should also be referenced. All references must have in-text citations, and all in-text citations must appear in the reference list. REFERENCES Buxton, L. (2017). Ditching deficit thinking: Changing to a culture of high expectations. Issues in Educational Research, 27(2), 198–214. Effects of global warming on whales. (n.d.). Retrieved from http://www.stopwhaling.org/site/c.foJNIZOyEnH/b.2660179/k.BBA 7/Stop_Whaling__Effects_of_Global_Warming_on_Whales__IFA W_US.htm MacCulloch, D. (1996). Thomas Cranmer: A life. New Haven: Yale University Press. Maxwell, J. C. (1892) A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, pp.68–73. NSW Department of Health. (2013). Why your baby needs to quit smoking [Fact sheet]. Retrieved from http://www.health.nsw.gov.au/tobacco /Publications/baby-needs-you -to-quit.pdf Ogilvie, D. (n.d.). Why I don’t eat honey. In Why be vegan. Retrieved from http://www.vegetarianvictoria.org.au/ http://www.causalproductions.com/ http://student.csu.edu.au/library/integrity http://www.stopwhaling.org/site/c.foJNIZOyEnH/b.2660179/k.BBA%207/Stop_Whaling__Effects_of_Global_Warming_on_Whales__IFA%20W_US.htm http://www.stopwhaling.org/site/c.foJNIZOyEnH/b.2660179/k.BBA%207/Stop_Whaling__Effects_of_Global_Warming_on_Whales__IFA%20W_US.htm http://www.stopwhaling.org/site/c.foJNIZOyEnH/b.2660179/k.BBA%207/Stop_Whaling__Effects_of_Global_Warming_on_Whales__IFA%20W_US.htm http://www.health.nsw.gov.au/tobacco%20/Publications/baby-needs-you%20-to-quit.pdf http://www.health.nsw.gov.au/tobacco%20/Publications/baby-needs-you%20-to-quit.pdf http://www.vegetarianvictoria.org.au/ ITC571 202060 S I Version 2 - Published 08 July 2020 Subject Outline ITC571 - Emerging Technologies and Innovation Table of Contents Subject Summary ...................................................................................................................2 Subject Coordinator ...............................................................................................................2 Subject Coordinator ..................................................................................................2 Email ..........................................................................................................................2 Phone ............................................................
Answered Same DayAug 09, 2021ITC571Charles Sturt University

Answer To: IEEE Paper Template in A4 (V1) 1 | P a g e School of Computing and Mathematics Faculty of Business,...

Deepti answered on Aug 15 2021
145 Votes
Reearch report
Utilizing Blockchain Technology in IoT
Student Name
ABSTRACT
The paper proposes the utilization of the Blockchain Technology in the IoT devices. The distributed ledger technology of blockchain has materialized as an interesting object of applied science. The concerns that hinder the IoT industry from flourishing can be addressed using Blockchain technology. It can track millions of devices, enable transaction processing among the devices, and provide substantial cost and time savings to various manufacturing industries who intend to use IoT. The issues related to privacy, reliability, scalability can be addressed through the use of blockchain. Decentralized approach of this technology will remove the points of failure offering the devices with a more resilient ecosystem.
The objective of this pap
er is to analyze the current trends on the utility of blockchain mechanism in IoT smart devices. The scope of the paper includes the architecture of IoT technology and Blockchain technology. It further demonstrates the use of Blockchain in IoT devices in various industry segments as use cases to gain a better understanding of integrating the two technologies. The combined technology can be beneficial for industries like banking, supply chain and logistics, pharmacy and healthcare and Intellectual Property Copyright. The paper discusses each of these industries highlighting the concerns of IoT and how blockchain can improve the prospects of securing digital data in each of these segments. The study presents possible ways of integrating IoT with Blockchain in a general context. The combined technology offers various advantages of security and authentication of digital data, immutability, and decentralization which are discussed along with the challenges encountered in this integration limiting their utilization. The challenges faced by the researchers are analyzed in depth thus highlighting the common issues and future research prospects.
Observations through this research that blockchain in IoT is creating opportunities and offering competitive advantage for businesses in various markets. Majorly impacting the storage of digital data and its collection, it further involves the transportation of the data over blockchain network. As a distributed technology, blockchain ensures scalability, privacy, and reliability, and acts as a cornerstone for further development of IoT environments. In past few years, the Blockchain technology has remarkably matured and can be counted upon as a favorable solution in accomplishing the objective of integrating it with IoT.
The paper concludes that the analysis of data is extremely important to IoT thus requiring protection throughout the transaction life cycle. Information management is crucial and architecture of an IoT system with blockchain is complex due to the administrative boundaries and lack of compliance policy and procedures for the flow of data. This complexity entails challenges of keeping the data in IoT secure.
Keywords: IoT, Blockchain, decentralization, distributed ledger, integration, smart devices.
Contents
ABSTRACT    0
1.    INTRODUCTION    2
2.    LITERATURE REVIEW    2
2.1.    IoT Technology    2
2.2.    Blockchain Technology    3
2.3.    Utility of Integration of IoT and Blockchain    4
2.3.1.    Use Case: Pharmacy industry & Healthcare    4
2.3.2.    Use Case: Supply Chain and Logistics    4
2.3.3.    Use Case: Banking    4
2.3.4.    Use Case: Intellectual Property Copyright    5
3.    FINDINGS    5
3.1.    Benefits    5
3.2.    Challenges    6
4.    CONCLUSION    7
5.    REFERENCES    8
1. INTRODUCTION
Internet of Things has trended as a technology with substantial impact across multiple verticals with a prediction of billions of devices in use by 2022 (Ericsson, 2017). The IoT technologies shall offer a technological edge to small devices globally. It is capable of connecting people, products, services and places thus offering a wide range of opportunities for value creation. However, the limitation of centralized structures leading to constrained access control pose challenges in this domain of technological innovation. On one hand, the global nature of IoT encourages the construction of new applications for the end user, but lacks the robust security measures that may lead to critical issues like data breach subjected to tampering of data or data loss due to cyberattacks on smart devices. A traditional access control system catered to the scenarios where all the devices are trustworthy and a centralized access control system works well. But this system cannot solve the purpose with mobile IoT devices which may be managed by more than one manager.
Blockchain can alleviate the scalability and security issues related to IoT in several ways. The distributed ledger eliminates the requirement of trust among the participants owing to its immutability. None of the participants can hold the authority over the enormous data generated by the devices. Encryption offered by blockchain makes the devices secure as it makes tampering of data records virtually impossible. Transparency is provided to an extent that any stakeholder authorized to remain on the network can track transactions thus identifying any data leakage quickly. Transaction processing becomes faster. Although it becomes challenging hen the size of the network grows, but distributed ledger supports a considerable number of transactions. The processing overheads of IoT gateways including communication overhead costs, hardware, protocols, etc. is eliminated by establishing trust among the stakeholders.
In this paper, the technology of blockchain is researched to be integrated with IoT devices as a solution to the challenges faced by IoT technology. The adoption of blockchain technology over IoT eliminates the issue of centralized access control. First, the IoT technology is discussed in detail explaining about the three stages of its architecture and the use of sensors, actuators, layers and protocols. This discussion is followed by an overview of blockchain technology and the use of Cryptographic Digital Signature, distributed ledger and consensus algorithm in this domain. The paper further discusses the utility of blockchain with IoT smart devices by demonstrating four use cases namely pharmacy and healthcare, supply chain and logistics, banking and intellectual property copyright. The advantages that this technology integration brings forth include decentralization, immutability, anonymization and agreement enforcement through smart contracts. However, utility of blockchain with IoT faces certain issues like scalability, interoperability, compliance, security and privacy. The paper concludes by reflecting upon the technologies and highlighting the possibilities of further research in exploring the combination of the two technologies which when exploited to its full potential, shall lead to unprecedented future of the digital world.
2. LITERATURE REVIEW
2.1. IoT Technology
The IoT architecture for a system consists of three stages of physical, communication and application. These are stated as end-device layer, edge-device layer and Server and Backend layer respectively by Ramachandran and Krishnamachari in (Ramachandran, 2018). IoT architecture is a system that comprises of a plethora of sensors, actuators, protocols, layers and cloud services. The first layer comprises of memory constrained battery-operated devices with actuators and sensors. The devices within this layer sense and record data, perform computing and transfer data over the network and have limited capability of storage and computation. Simply put, sensors detect, measure and indicate specific quantity like heat, pressure, etc. by converting them into electrical pulses. Actuators are transducers which are activated once sensors sense the data in order to perform action within their designated environment. In the second layer, the data is collected from the physical layer and transmitted to the IT world using enhanced analytics and pre-processing. The edge IT systems reside near the actuators and sensors. This layer is responsible for defining the networks and several communication protocols required for connectivity so that data can be processed at the edge of the defined network....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here