Font Size: a A A

Research On Low Latency Data Allocation Scheme Under Data Security For Industrial Internet Of Things

Posted on:2020-10-07Degree:MasterType:Thesis
Country:ChinaCandidate:B W YaoFull Text:PDF
GTID:2428330602450986Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology and communication technology,the Internet of Things represented by the Industrial Internet of Things(IIoT)has rapidly emerged.As a key technology for the transformation from traditional industry to intelligent industry,IIoT has received extensive attention and research from industry and academia.In the existing IIoT network architecture,the cloud computing center has become an important solution for data processing and storage with its superior performance.However,cloud computing platforms are often deployed in network centers that are far away from IIoT users.The latency generated by data transmission over the network and the security during data transmission cannot be guaranteed.Therefore,it is difficult to meet the requirements for latency and data security in IIoT.In view of the shortcomings of the IIoT architecture with cloud computing as the core,this paper studies the fog computing and distributed storage.This paper first analyzes the advantages of introducing fog computing in the IIoT environment,and deeply studies the cloud hybrid IIoT architecture,and uses distributed storage to enhance data security.Subsequently,the data transmission latency model under security guarantee is constructed,and the data distribution strategy under the model is studied to optimize the data transmission latency.The specific research contents of this paper are as follows:In the IIoT environment,aiming at the problem of high data transmission latency in the storage of data based on cloud core network architecture,this paper studies a cloud fog hybrid IIoT architecture.The architecture uses the fog devices to store data in the IIoT to reduce the transmission latency.What's more,this paper builds a distributed storage system with the fog devices to improve the security of the data storage.Then,in the architecture,the security of the data storage allocation scheme and the transmission latency of the data distributed storage are modeled,and the optimization problem of the minimum data transmission latency under security guarantee is proposed.Aiming at this problem,the data distribution strategy based on ant colony algorithm is studied to achieve the goal of minimum data transmission latency.The simulation results show that the cloud fog hybrid IIoT architecture based on ant colony algorithm can effectively reduce the data transmission latency while ensuring the security of data storage.Based on the single-user research,this paper studies a software-defined cloud fog hybrid IIoT architecture for the multi-user environment in the IIoT environment.In this architecture,the cloud computing center is regarded as a high-security large-capacity storage node,and together with multiple fog devices constitute a distributed storage system.At the same time,the network architecture is supplemented by the control capability of Software Defined Network(SDN).SDN technology enables real-time management of multi-user systems based on network dynamics.Under this architecture,this paper models the total latency of multiuser data transmission.Besides,based on the data storage scheme security model of singleuser research,this paper proposes the lowest problem of the total data transmission latency under the constraints of data security and storage node capacity.Aiming at this problem,the optimized ant colony algorithm is used to solve its data allocation strategy and achieve the goal of lowest latency.The simulation results show that when the 80 MB data is stored,the latency performance of the software-defined cloud fog hybrid IIoT architecture improved by86.7%,75.3% compared with cloud computing architecture,the single fog node.
Keywords/Search Tags:Industrial Internet of Things, fog computing, cloud computing, latency, data security, data allocation
PDF Full Text Request
Related items