You are on page 1of 10

ABSTRACT

In this project, investigate a secure mobile edge computing (MEC) network in the presence of
multiple eavesdroppers, where multiple users can offload parts of their tasks to the computational
access point (CAP). The multiple eavesdroppers may overhear the confidential task offloading,
which leads to information leakage. In order to address this issue, present the minimization
problem of the secrecy outage probability (SOP), by jointly taking into account the constraints
from the latency and energy consumption. With the aim to improve the system secrecy
performance, we then introduce three user selection criteria to choose the best user among
multiple ones. Specifically, criterion I maximizes the locally computational capacity, while
criterion II and III maximize the secrecy capacity and data rate of main links, respectively. For
these criteria, we further analyze the system secrecy performance by deriving analytical and
asymptotic expressions for the SOP, from which we can conclude important insights for the
system design. Finally, simulation and analytical results are provided to verify the proposed
analysis.
CONTENTS

Chapter-1: ORGANIZATION PROFILE

1.1 INTRODUCTION
1.2 ORGANIZATION PROFILE
1.3 ORGANIZATION OF PROJECT

Chapter-2: PROBLEM DEFINITION

2.1 INTRODUCTION

2.2 EXISTING SYSTEM

2.2.1 DRAW BACKS OF EXISTING SYSTEM

2.3 PROPOSED SYSTEM

2.3.1 ADVANTAGES OF PROPOSED SYSTEM

2.4 MODULES

Chapter-3: FEASIBILITY STUDY

3.1 OPERATIONAL FEASIBILITY

3.2 TECHNICAL FEASIBILITY

3.3 ECONOMICAL FEASIBILITY


Chapter-1: ORGANIZATION PROFILE

1.1 INTRODUCTION

The development and deployment of the fifth-generation (5G) wireless networks and the
roadmap towards the sixth-generation (6G) have enabled the research community to investigate
new methods for high-speed data rate, ultra-low latency and ubiquitous access, in order to
launch intelligent applications, such as autonomous driving and smart healthcare. One major
characteristic of these new applications is the need for intensive computation, which clearly
shows the evolution from traditional communication-oriented to computation-oriented systems.
In the computational-oriented systems, the performance metrics of interest have extended from
those related to traditional communication quality, such as the data rate and bit error rate, to
latency, energy consumption, etc. To support these new applications with the need of intensive
computation load, one solution is to compute the tasks in the cloud server, which however,
imposes a huge burden on the communication and may cause a large latency and energy
consumption. To alleviate this, mobile edge computing (MEC) has been proposed, which
exploits the computational capability of near-by devices through offloading some parts of the
users’ tasks. It has been widely shown in the literature that MEC can reduce the system latency
and energy consumption, and so, it can be efficiently used to support applications of 5G and 6G
networks

1.2 ORGANIZATION PROFILE

Info Search banks on ideas that work! When others stand as Service Providers, we stamp as an
Executor of a tailored Internet Marketing Strategy! And by the time, are you seeking the best
ways to rule the internet pros? Say yes, the future will certainly hold by Internet Marketing
Strategy with big ROI by all means!Now will turn the coin! Why don’t you try out this
emerging trend instead going customary as in the Columbian era? Endeavor with this bespoken
strategy which bangs heavy to shed high returns that is all it matters!

Internet Marketing includes SEO and additional online marketing tools gains you the
attention of potential customers and the search engines. Each of the marketing techniques down
below IM Strategy work to drive motivated traffic to your website and allow you to compete
more effectively. Since the most important long-term foundation for any business website is to
gain visibility of their first page on search engines.

Info Search is a full-fledged internet marketing firm that is specialized in SEO, SMO, Website
Design & Development and Content Creation Services especially for business e-commerce
companies and also to other vertical business modes.It is important to acknowledge one fact,
unless you have a proprietary product for sale, chances are pretty good that someone else is
already selling that on the internet.

1.3 ORGANIZATION CHART

CEO

Head Operations/
Head Sales Head Finance/HR
Production

Program manager Program manager


Technical project planning

Project Business Project Operations


Leader/Module Analysts manager manager
Leader

Software Engineers Testers Domain Specialist Support


Fig 1.3 ORGANIZATION CHART.

Chapter-2: PROBLEM DEFINITION


2.1INTRODUCTION

In this project, investigate a secure mobile edge computing (MEC) network in the presence of
multiple eavesdroppers, where multiple users can offload parts of their tasks to the computational
access point (CAP).

2.2EXISTINGSYSTEM

In MEC networks, offloading is a key method to improve the system performance, by reducing
the latency and energy consumption. The offloading policy determines how many parts of tasks
will be computed by the computational access points (CAPs). In this direction, the authors
investigated a joint offloading and computing optimization for MEC networks, where an optimal
resource allocation scheme was developed to minimize the energy consumption at the CAP.
Specifically, for the unmanned aerial vehicle (UAV)-enabled MEC networks, partial or binary
computation offloading mode can be used to maximize the computation rate.

Later, the system computation efficiency of the wireless-powered MEC networks was
effectively enhanced by jointly devising the offloading strategy and the local computing
frequency. Furthermore, the impact of energy and task causality on the MEC networks was
investigated, where task offloading and local computing along with the energy beam forming
were jointly optimized to minimize the system energy consumption. Finally, the authors
proposed an offloading strategy for MEC networks with multiple CAPs, where both selection
and switch-and-stay combining protocols were employed to reduce the system latency and
energy consumption.

2.2.1 DISADVANTAGES OF AN EXISTING SYSTEM


 An Existing Methodology Doesn’t Implement Sop Minimization Problem And User
Selection Criteria Method.
 The System Not Implemented Analysis Of The Secrecy Outage Probability.

2.3 PROPOSED SYSTEM

In this project, we study a secure MEC network in the presence of multiple eavesdroppers, where
multiple users can offload some parts of task to the CAP. The task offloading may be overheard
by the multiple eavesdroppers in the network, which causes the severe issue of information
leakage. In order to improve the network secrecy performance, then employ three user selection
criteria to choose one best user among multiple ones to be assisted by the CAP. Specifically,
criterion I maximizes the locally computational capacity, while criterion II and III maximize the
secrecy capacity and data rate of main links, respectively and proceed with the following
important question: “What is the effect of the system parameters on the secure MEC networks
design?”. To tackle this problem, study the system secrecy performance of the secure MEC
networks, by deriving analytical and asymptotic expressions for the SOP of the three user
selection criteria and further analyze how the system SOP is related to the network parameters,
from which we obtain important insights for the system design. Simulations and numerical
results are finally presented to verify the proposed analysis

2.3.1 ADVANTAGES OF PROPOSED SYSTEM

 The system investigates a secure MEC network in the presence of multiple


eavesdroppers, and present the SOP minimization problem by jointly taking into account
the constraints from the latency and energy consumption.
 To improve the system secrecy performance, we provide three user selection criteria to
choose the best user among multiple ones, based on the computational capability and
channel parameters, respectively.
 For the three user selection criteria, we analyze the system secrecy performance by
deriving analytical SOP expressions, in order to evaluate the impact of network
parameters on the secrecy performance in the entire MER regime.
2.4MODULES
In this proposed system, there are modules. They are :

1. Server
2. Sub Admin
3. End User

1. Server

In this module, the Server has to login by using valid user name and password. After login
successful he can do some operations such as Login, View All Users And Authorize, View All
Datasets, View All Datasets By Block chain, View All Eavesdropper Attack Type Results, Find
View All Attack Type Results.

2. Sub Admin

In this module, the Sub Admin has to login by using valid user name and password. After login
successful he can do some operations such as Login, View All Datasets, View All Datasets By
Block chain, Find View All Attack Type Results

3. End User

In this module, there are n numbers of users are present. User should register before doing any
operations. Once user registers, their details will be stored to the database. After registration
successful, he has to login by using authorized user name and password. Once Login is
successful user will do some operations like Register and Login, View Profile, Upload
Datasets, Find Attacks, Find Attacker Type Results By Hashcode.

Chapter-3: FEASIBILITY STUDY

An important outcome of preliminary investigation is the determination that the system request is
feasible. This is possible only if it is feasible within limited resource and time. The different
feasibilities that have to be analyzed are
 Operational Feasibility
 Economic Feasibility
 Technical Feasibility

3.1 Operational Feasibility

Operational Feasibility deals with the study of prospects of the system to be developed.
This system operationally eliminates all the tensions of the Admin and helps him in effectively
tracking the project progress. This kind of automation will surely reduce the time and energy,
which previously consumed in manual work. Based on the study, the system is proved to be
operationally feasible.

3.2 Economic Feasibility

Economic Feasibility or Cost-benefit is an assessment of the economic justification for a


computer based project. As hardware was installed from the beginning & for lots of purposes
thus the cost on project of hardware is low. Since the system is a network based, any number of
employees connected to the LAN within that organization can use this tool from at anytime. The
Virtual Private Network is to be developed using the existing resources of the organization. So
the project is economically feasible.

3.3 Technical Feasibility

According to Roger S. Pressman, Technical Feasibility is the assessment of the technical


resources of the organization. The organization needs IBM compatible machines with a graphical
web browser connected to the Internet and Intranet. The system is developed for platform
Independent environment. Java Server Pages, JavaScript, HTML, SQL server and WebLogic
Server are used to develop the system. The technical feasibility has been carried out. The system
is technically feasible for development and can be developed with the existing facility.
SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

 Processor- Intel (R) Core (TM) i3-4200U


 CPU - 1.6GHz
 RAM:4 GB
 Hard Disk: 500 GB.

SOFTWARE REQUIREMENTS

 Operating System- windows 10

 Server: Apache Tomcat

 Database: MYSQL Server 5.0

 Frontend: HTML, CSS, JS

 Backend: JSP

 IDE: Notepad++

You might also like