Loading...

Implementation of an IoT Edge Computing Module in Compliance with TPM Standards

Hasanizadeh, Parisa | 2018

334 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 51304 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Bayat Sarmadi, Siavash
  7. Abstract:
  8. Cloud computing has a significant role in expanding applications of the Internet of Things (IoT). Currently, applications such as virtual reality and augmented reality require low latency, which is not achievable using traditional cloud computing in some scenarios. Edge computing is a new approach in IoT, which solves some of the limitations of the cloud computing by extending and developing its operations. Reducing response time and network traffic are some of the most important achievements of edge computing. Despite of its numerous advantages over cloud computing, edge computing faces serious challenges such as virtualization, implementation infrastructure, resource allocation and task offloading, distribution of processing nodes, user mobility, security and privacy. The main contribution of this thesis is in two folds; first, we study security and privacy challenges in edge computing while proposing a comprehensive classification of current available solutions for these challenges. Second, we design and implement a processing module for edge computing with focus on security and privacy challenges. The proposed architecture benefiting from secure boot and data encryption provides a solution for preserving privacy. The proposed module receives data from network gateway and encrypts it using AES cryptographic algorithm before storing. In today’s hardware system, secure boot and secure data storage are implemented using TPM chips; while in this project, they are implemented by on-board resources. The proposed classification, divides security and privacy challenges in edge computing into followings: virtualization, network infrastructure, data security, malware protection, user device security, privacy, core (cloud) infrastructure and edge node security. Moreover, the proposed and implemented module is resistant against attacks such as expected service manipulation (edge node security) and data bridge (data security)
  9. Keywords:
  10. Internet of Things ; Mobile Edge Computing ; Privacy Preserving ; Security ; Secure Boot ; Trusted Platform Module (TPM)