SACM - Australia

Permanent URI for this collectionhttps://drepo.sdl.edu.sa/handle/20.500.14154/9648

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    ItemRestricted
    Software and Hardware Redundancy Approaches to Improve Performance and Service Availability in Fog Computing
    (Saudi Digital Library, 2023-12-28) Alraddady, Sara; Soh, Boon
    Fog computing is a new distributed computing paradigm. It was introduced to address the massive increase in the number of connected devices since cloud computing faces difficulties handling all requests placed simultaneously. This new paradigm , which is an extension of cloud computing, can increase the efficiency of services provided in many sectors including health care, industry, agriculture, environmental hazard management, smart cities, and autonomous transportation. Some sectors, such as health care and autonomous driving, are highly non-tolerant of delays. In such sectors, high response time and poorly available services can lead to fatal results endangering the lives of many. On the contrary, other sectors such as e-commerce and telecommunication companies can tolerate delays to a certain extent, yet there is always a cost. Delays in such systems do not result in fatalities, as can happen in non-delay tolerant sectors, although delays can cause degraded quality of service and financial loss. Hence, regardless of the level of delay tolerance, delays are not desired. Given the distributed and diverse nature of fog computing, there are some challenges such as device heterogeneity that need be addressed to prepare fog computing for commercial use. Because any device can be a fog node, energy constraints must be considered to maximise device utilisation while still delivering the required quality of service. Also, different devices have various connecting methods which increase complex network connectivity for fog computing. It is also important to consider preventing fog node from exploitation and ensuring that requests are not randomly processed by different fog nodes. This thesis incorporates a management layer in fog computing to address the identified challenges. The proposed model was evaluated using simulations in iFogSim. The results show improved performance in important metrics such as execution time and bandwidth consumption compared to several fog architectures. For higher availability, a duplex management system is proposed and designed using Petri nets. A Markov chain is used to calculate failure probabilities for each node in the management layer, and availability analysis is presented.
    7 0
  • Thumbnail Image
    ItemRestricted
    Cybersecurity Practices, Challenges and Applications in Saudi Smart Cities: Developing and Testing Extended UTAUT3 Model Using Multi-stage Samplings
    (Saudi Digital Library, 2023-12-04) Alhalafi, Nawaf Hamdan T; Veeraraghavan, Prakash
    The Kingdom of Saudi Arabia has been making significant progress towards developing intelligent cities, with projects such as NEOM and Riyadh City. Therefore, this study investigates the challenges and factors influencing the adoption of cybersecurity practices in smart cities within the Kingdom of Saudi Arabia using the cybersecurity-based Unified Theory of Acceptance and Use of Technology (UTAUT3) framework. In four phases, the study initially collected insights from the public and IT professionals through pre-test surveys to identify key challenges in cybersecurity adoption. The study then conducted a second survey to refine the UTAUT3 model in line with the unique cybersecurity challenges experienced in smart Saudi cities. This allowed exploring the economic, social, and cultural factors affecting cybersecurity implementation. Economic factors included privacy design and cyber threat intelligence; social factors covered digital trust and resilience; and cultural factors focused on cybersecurity competency and awareness. In the third phase, the study validated the extended UTAUT3 model, assessing the suitability of data for analysis and evaluating the reliability and validity of the measurement constructs. The aim was to enhance understanding of the factors impacting cybersecurity adoption, ensuring that the extended model is useful for future research and policy development. In the final phase, post-testing was conducted to measure behavioural intentions in adopting cybersecurity practices. Results showed that factors such as performance expectancy, effort expectancy, social influence, facilitating condition, and various attributes of cybersecurity (resilience, safety, confidentiality, availability, and integrity) positively influence the behavioural intention to adopt cybersecurity. Multi-group analysis revealed differences between IT professionals and the general public in the behavioural intention of adopting cybersecurity in smart cities. This study contributes significantly to understanding cybersecurity adoption in smart cities, providing valuable insights for future interventions or policies. It underscores the need to consider group differences when promoting cybersecurity adoption to ensure effective outcomes.
    63 0

Copyright owned by the Saudi Digital Library (SDL) © 2025