Preprint Article Version 1 This version is not peer-reviewed

Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities

Version 1 : Received: 22 July 2024 / Approved: 23 July 2024 / Online: 24 July 2024 (07:06:36 CEST)

How to cite: Karthick, G.; Ezra, G. M. Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities. Preprints 2024, 2024071821. https://doi.org/10.20944/preprints202407.1821.v1 Karthick, G.; Ezra, G. M. Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities. Preprints 2024, 2024071821. https://doi.org/10.20944/preprints202407.1821.v1

Abstract

In the future, smart cities will provide key services including seamless communication, intelligent transport systems, advanced healthcare platforms, urban and infrastructure management, and digital services for local and regional government. Therefore, a new service and networking paradigm, called the Intelligent Edge Environment, has been specified. and is known as the Intelligent Edge Environment. As a key part of this system, a new secure service ecosystem must be developed to provide the secure realtime movement of services on different High-Performance Edge Cloud Systems. This paper explores these issues by introducing the following mechanisms: the Resource Allocation Algorithm, the Resource Allocation Secure Protocol and finally the Secure Service Protocols. These systems were integrated into the Basic Capabilities System Library and a multithreaded FUSE client connected to the Service Management Framework. Docker was used as a migration mechanism. A prototype was developed and implemented using a FUSE-Network Memory System in which the Network Memory Server was migrated as users move around. The result shows that this approach was safe and could be used to develop new applications and services for smart cities.

Keywords

Intelligent Edge Environment; Secure Service Ecosystem; Capabilities; FUSE; Docker; SMART Ciities

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.