Abstract

Data reliability and confidence in the data are very important issues, especially when the system integrates fraud or false information. The misusing of data collected may create serious problems. With the fast development of computing techniques, much data are collected from various terminals and industrial devices. Edge computing operates by driving data, software and computer resources from the centralized network to its extremes, allowing pieces of knowledge to lie on distributed cloud networks. Its target customers continue to use commercial Internet application software for every internet customer. Edge computing is used to provide delay-free customer experience assistance for features of the Internet of Things (IoT) services on the edge of the user network. The document identifies an IoT computing platform collaborating with the edge competitive data management latency (CDML) tool. This approach separately categorizes edge layer requests and response data over time using demand-density driven optimization. A difference-based optimization optimizes the frame limits for simultaneous request processing and exact allocation of data. The architectural efficiency of edge computing can be assessed by comparing latency, bandwidth usage, and overhead. Furthermore, estimating the availability, credibility and confidentiality of security solutions within each party would take into consideration security concerns in edge computing and propose a safety assessment process for IoT networks with edge computing. This procedure is finally validated using appropriate tests, and the resulting findings are examined to demonstrate the method’s accuracy. Experimental data are used to validate methods to request maintenance and processing, response time, resource utilization and contract period. In comparison to current approaches, the results of the proposed CDML are measured with a percentage of 97.90%. The proposed system enhances the request and response comparison ratio 97.5%, analyzing request performance ratio 98.1%, response with time analysis ratio of 98.3%, data allocation approach analysis ratio 97.7%.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.