FOG COMPUTING
-
Upload
saisharan-amaravadhi -
Category
Technology
-
view
612 -
download
1
Transcript of FOG COMPUTING
![Page 1: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/1.jpg)
FOG COMPUTING
![Page 2: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/2.jpg)
CONTENTS:
Abstract.
Introduction.
Existing System.
Proposed System.
Scenarios.
Security Issues.
Example.
Privacy Issues.
Conclusion.
Future Enhancement.
References.
![Page 3: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/3.jpg)
ABSTRACT:
Fog Computing is a paradigm that extends
Cloud computing and services to the edge of the network. Similar
to Cloud, Fog provides data, compute, storage, and application
services to end-users. The motivation of Fog computing lies in a series
of real scenarios, such as Smart Grid, smart traffic lights in vehicular
networks and software defined networks.
![Page 4: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/4.jpg)
INTRODUCTION:
CISCO recently delivered the vision of fog
computing to enable applications on billions of connected devices to run
directly at the network edge. Customers can develop, manage and run
software applications on Cisco framework of networked devices, including
hardened routers and switches. Cisco brings the open source Linux and
network operating system together in a single networked device.
![Page 5: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/5.jpg)
Fog
Cloud
Locations
Edge
Core
![Page 6: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/6.jpg)
A simple three level hierarchy as shown in above Figure.
In this framework, each smart thing is attached to one of Fog devices. Fog
devices could be interconnected and each of them is linked to the Cloud.
![Page 7: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/7.jpg)
EXISTING SYSTEM
Cloud computing has provided many opportunities for enterprises by
offering their customers a range of computing services. Current “pay-as-
you-go” Cloud computing model becomes an efficient alternative to owning
and managing private data centers for customers facing Web applications
![Page 8: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/8.jpg)
DISADVANTAGES:
Existing data protection mechanisms such as encryption was failed in
securing the data from the attackers.
It does not verify whether the user was authorized or not.
Cloud computing security does not focus on ways of secure the data from
unauthorized access.
![Page 9: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/9.jpg)
PROPOSED SYSTEM
Unlike traditional data centers, Fog
devices are geographically
distributed over heterogeneous
platforms, spanning multiple
management domains. Cisco is
interested in innovative proposals
that facilitate service mobility across
platforms, and technologies that
preserve end-user and content
security and privacy across domains.
![Page 10: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/10.jpg)
ADVANTAGES:
Fog can be distinguished from Cloud by its proximity to end-users.
The dense geographical distribution and its support for mobility.
It provides low latency, location awareness, and improves quality-of-
services (QoS) and real time applications.
![Page 11: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/11.jpg)
Scenarios
Smart grid
Smart Traffic Lights
Wireless Sensor
Decentralized
Smart Building Control
Internet of Things
Software Defined
Networks
![Page 12: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/12.jpg)
SECURITY ISSUES:
The main security issues are authentication at different
levels of gateways as well as (in case of smart grids) at the smart meters
installed in the consumer’s home. Each smart meter and smart appliance
has an IP address. A malicious user can either tamper with its own smart
meter, report false readings, or spoof IP addresses.
![Page 13: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/13.jpg)
EXAMPLE : MAN-IN –MIDDLE-ATTACK
In this subsection, we take man- in-the-middle attack as
an example to expose the security problems in Fog computing. In this
attack, gateways serving as Fog devices may be compromised or replaced by
fake ones .
![Page 14: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/14.jpg)
PRIVACY ISSUES:
In smart grids, privacy issues deal with hiding details, such
as what appliance was used at what time, while allowing correct
summary information for accurate charging.
![Page 15: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/15.jpg)
CONCLUSION:
Fog computing advantages for services in several domains,
such as Smart Grid, wireless sensor networks, Internet of Things (IoT)
and software defined networks (SDNs). We examine the state- of-the-art
and disclose some general issues in Fog computing including security,
privacy, trust, and service migration among Fog devices and between Fog
and Cloud.
![Page 16: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/16.jpg)
FUTURE ENCHANCEMENT:
• Future work will expand on the Fog computing paradigm in Smart Grid. In
this scenario, two models for Fog devices can be developed. Independent
Fog devices consult directly with the Cloud for periodic updates on price
and demands, while interconnected Fog devices may consult each other.
• Next, Fog computing based SDN in vehicular networks will receive due
attention.
![Page 17: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/17.jpg)
REFERENCES :
[1] F. Bonomi, “Connected vehicles, the internet of things, and fog com-
puting,” in The Eighth ACM International Workshop on Vehicular Inter-
Networking (VANET), Las Vegas, USA, 2011.
[2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its
role in the internet of things,” in Proceedings of the First Edition of the MCC
Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.
![Page 18: FOG COMPUTING](https://reader031.fdocuments.in/reader031/viewer/2022012400/55a796251a28ab911f8b475c/html5/thumbnails/18.jpg)