Papers by Shradhdha Thakkar
International Journal of Electrical and Electronics Engineering (SSRG), 2024
This paper presents a Trust Management System (TMS) designed to counteract cyber-attacks in fog c... more This paper presents a Trust Management System (TMS) designed to counteract cyber-attacks in fog computing environments. The system integrates fuzzy AHP, hierarchical PROMETHEE methods, and fuzzy ranking to evaluate trust based on Quality of Service (QoS), Quality of Security (QoSec), and economic factors. Tested against Replay, On-Off, Bad-mouthing, and Ransomware attacks, the system demonstrates high detection accuracy, with error rates between 3.50% and 4.15%. The results show that the proposed TMS effectively enhances security and trust evaluation in fog computing networks.

International Journal on Recent and Innovation Trends in Computing and Communication, 2015
Hadoop is a Java-based programming framework which supports for storing and processing big data i... more Hadoop is a Java-based programming framework which supports for storing and processing big data in a distributed computing environment. It is using HDFS for data storing and using Map Reduce to processing that data. Map Reduce has become an important distributed processing model for large-scale data-intensive applications like data mining and web indexing. Map Reduce is widely used for short jobs requiring low response time. The current Hadoop implementation assumes that computing nodes in a cluster are homogeneous in nature. Unfortunately, both the homogeneity and data locality assumptions are not satisfied in virtualized data centers. Hadoop's scheduler can cause severe performance degradation in heterogeneous environments. We observe that, Longest Approximate Time to End (LATE), which is highly robust to heterogeneity. LATE can improve Hadoop response times by a factor of 2 in clusters.

Journal of Electrical System, 2024
The Internet of Things (IoT) has become indispensable for reducing human intervention by intercon... more The Internet of Things (IoT) has become indispensable for reducing human intervention by interconnecting smart devices capable of data transmission and reception through the internet. However, the proliferation of IoT devices has led to heightened concerns regarding security and privacy, particularly in identifying and eliminating compromised or malicious nodes. In response, a light weight trust management system is proposed. Fog Trust features a multi level architecture comprising edge node, a trusted intermediary known as the trust agents, and fog layer. The agent facilitates communication between IoT node and fog layer for computational purposes, alleviating the computational burden on node and ensuring a reliable environment. By calculating the trust degree, the trust agent transmit it to fog layer, that employ encryptions techniques to uphold intigration. The encrypted data is shared with previous trust to add on, enhancing the accuracy of the trust degree. Evaluation of the trust management system approach against potential attack such as GoodMouthig, and Bad-mouthng shows its efficacy in assigning low trust degree to malicious node across different scenario, even when network gets varying proportions of malicious node. .

International Journal of Intelligent Systems and Applications In Engineering, 2024
In this research, we investigate how to include a Trust Management System (TMS) into fog computin... more In this research, we investigate how to include a Trust Management System (TMS) into fog computing-a decentralized computing architecture that expands cloud computing's capabilities to the edge of a network. We conduct an inquiry into the application and evaluation of a new multi-criteria trust mechanism designed specifically for fog computing settings. This approach, which combines "soft trust" with "hard trust," is essential to assessing and controlling the dependability and credibility of entities in the fog computing environment. We discover that the implementation of trust models in this setting improves the reliability and usefulness of Electroencephalography (EEG) applications in various domains, including neurology and clinical medicine. Additionally, these models aid in the creation of implementations that are safe, intuitive, and compliant with ethical standards.

International Journal on Recent and Innovation Trends in Computing and Communication, 2023
As fog computing emerges as a natural extension of cloud computing, its decentralized nature brin... more As fog computing emerges as a natural extension of cloud computing, its decentralized nature brings numerous advantages, such as reduced latency and enhanced Quality of Service (QoS). However, this paradigm also introduces significant security and privacy challenges, particularly when fog nodes collaborate and exchange data. In this paper, we propose a robust trust management system that evaluates both Quality of Service (QoS) and Quality of Protection (QoP) metrics from direct and indirect interactions among fog nodes. Our approach helps mitigate security risks posed by potentially malicious nodes by incorporating a predictive trust evaluation system. The proposed system reduces malicious interactions by approximately 66% and enhances response times by reducing latency by around 15 seconds. The findings demonstrate that an effective trust management system is crucial for building secure and reliable fog computing environments.

Tuijin Jishu / Journal of Propulsion Technology, 2023
In this research, we investigate how to include a Trust Management System (TMS) into fog computin... more In this research, we investigate how to include a Trust Management System (TMS) into fog computing-a decentralized computing architecture that expands cloud computing's capabilities to the edge of a network. We conduct an inquiry into the application and evaluation of a new multi-criteria trust mechanism designed specifically for fog computing settings. This approach, which combines "soft trust" with "hard trust," is essential to assessing and controlling the dependability and credibility of entities in the fog computing environment. We discover that the implementation of trust models in this setting improves the reliability and usefulness of Electroencephalography (EEG) applications in various domains, including neurology and clinical medicine. Additionally, these models aid in the creation of implementations that are safe, intuitive, and compliant with ethical standards.

Harbine Engineering University, 2024
An innovative, intriguing paradigm called fog computing has the potential to solve the issues wit... more An innovative, intriguing paradigm called fog computing has the potential to solve the issues with conventional cloud computing. Fog server are used to process, manage, and store private and sensitive data, therefore security and privacy concerns need to be resolved before the fundamental of this certified technology. Putting into place a trust management system is one of these measures. A node's (or trustee's) reliability is evaluated using a set of standards decided upon by the trustor. To enable a trustor to assess the degree to which a parameter contribute the overall trust value of a trustee and if its beneficial to work with the node, it is imperative to identify and prioritise these criteria. The prioritisation of the trust parameter is a multi-task decision-making (MCDM) problem because it calls for the simultaneous consideration of several different criteria. In this study, trust parameters in fog computing are identified and given priority using a fuzzy analytics hierarchical process (Fuzzy-AHP) techniqu. The findings suggest that quality of service (QoS), quality of security (QoSec), and suggestions are the top prioritised parameters that a service requester can use to assess the amount of trust in a service provider. A service provider can use social relationships, which are ranked as the highest level of trust, to assess the degree of truthfulness of a svice requester, whereas reputation of past is least important factor.
Springer, 2023
The cloud computing is a technology which connects multiple nodes to each other in network. Cloud... more The cloud computing is a technology which connects multiple nodes to each other in network. Cloud computing facilitate sharing of computational task and resources with clients and servers. It also operates in heterogeneous environment but the main issue is privacy and security of data. The data generated by IoT is also very large in size. If all the data is passed to cloud, the latency will increase. Fog computing was introduced to decrease the problems of cloud computing. Cloud computing is not replaced by fog computing but it is a service which enhances the cloud services by separating data from users which is need to live on a node in the outskirts. Fog computing provides the service of cloud computing data centers which collaborate on processing, storage, and networking to end users.
Uploads
Papers by Shradhdha Thakkar