WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Leveraging Edge Computing Paradigms for Strengthening Security in IoT Networks: An Analysis of Mobile Cloud Approaches

Suneetra Chatterjee Chatterjee

Download Paper

Paper Contents

Abstract

As more and more devices connect to the Internet of Things (IoT), maintaining the confidentiality and authenticity of the data stored within these networks has become of the utmost importance. The purpose of this study is to investigate the feasibility of using mobile cloud infrastructures in conjunction with edge computing as a strategy to improve the safety of Internet of Things (IoT) systems. The inherent nature of edge computing allows it to drastically lower the latency and bandwidth overheads of traditional cloud-centric Internet of Things models, which paves the way for real-time anomaly detection to become a reality. The implementation of One-Class Support Vector Machine (1CSVM), a machine learning technique specialised for anomaly detection in cases when aberrant data is scarce and difficult to discriminate, lies at the heart of our methodology. We present a comprehensive analysis of how 1CSVM can be effectively integrated within the edge-mobile cloud paradigm to detect and mitigate threats at the data generation source, thereby reducing the risks associated with transmitting potentially compromised data to centralised cloud repositories. This is accomplished by detecting and mitigating threats at the data generation source. Our findings highlight the promise that this hybrid strategy holds for improving the security of the internet of things (IoT), offering both theoretical insights and practical instructions for its implementation.

Copyright

Copyright © 2023 Suneetra Chatterjee. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS31100007640
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us