Fog Computing: Seminar Report ON
Fog Computing: Seminar Report ON
Fog Computing: Seminar Report ON
ON
FOG COMPUTING
Submitted in partial fulfilment of the requirements
Amarnath Baliarsingh
Registration No. : 1601298037
For the
Session 2016-2020
i
Certificate
This is to certify that this seminar report entitled “ Fog Computing ” being
ii
ACKNOWLEDGMENT
iii
Contents
s Page No.
ABSTRACT…………………………………...…………...…… v
ACKNOWLEDGEMENT………………………………………. iii
List Of Figures ………………………………………………….. vi
1.INTRODUCTION……………………………………..……… 1
2.CLOUD COMPUTING…………………………………….…. 2
2.1 Introduction……………………………………….…..….. 2
2.2 Disadvantages of Cloud Computing…..……….................. 3
3. FOG COMPUTING……………………………………….…. 4
3.1 Introduction…………………………………………...….. 4
3.2 Characteristics of FOG Computing……..………………... 4
3.3 Why do we need FOG Computing………………………. 5
4.What we can do with FOG……………………..……………... 7
5. Security in FOG Computing………………….……….…........ 9
5.1 Decoy System…………………………………...………... 10
5.2 Advantages of FOG Computing……………..…………… 11
CONCLUSION…………………………………………….…… 13
FUTURE SCOPE………………………………………….……. 14
REFERENCES…………………………………………….…..... 15
iv
ABSTRACT
v
List Of Figures
Page No.
1. Cloud Computing……………………………………..……… 2
2. Fog Computing…………………………………….………… 4
3. Decoy System …………………………………….………….. 11
vi
Chapter 1
INTRODUCTION
1
Chapter 2
2
services such as computation or data storage to multiple redundant
offsite locations available on the Internet, which allows application
software to be operated using internet-enabled devices.
In Existing data protection mechanisms such as encryption was
failed in securing the data from the attacker. It does not verify whether
the user was authorized or not.
Cloud computing security does not focus on ways of secure the data
from unauthorized access.
In 2009 we have our own confidential documents in the cloud. This
file does not have much security. so, hacker gains access the
documents. Twitter incident is one example of a data theft attack in the
Cloud.
2.2. Disadvantages
No body is identified when the attack is happen.
It is complex to detect which user is attack.
We can not detect which file was hacking.
Cloud Computing Issue: Bandwidth
Transmitting and processing data requires bandwidth . The
more data, the more bandwidth is needed. Current cloud computing
models can’t keep up with the amount of bandwidth that will be
needed.
3
Chapter 3
4
3.2. CHARACTERISTICS OF FOG COMPUTING :
5
more involved in people’s life, current Cloud computing paradigm can
hardly satisfy their requirements of mobility support, location
awareness and low latency.
Fog computing is proposed to address the above
problem. As Fog computing is implemented at the edge of the network,
it provides low latency, location awareness, and improves quality-of-
services (QoS) for streaming and real time applications. Typical
examples include industrial automation, transportation, and networks
of sensors and actuators. Moreover, this new infrastructure supports
heterogeneity as Fog devices include end-user devices, access points,
edge routers and switches. The Fog paradigm is well positioned for real
time big data analytics, supports densely distributed data collection
points, and provides advantages in entertainment, advertising,
personal computing and other applications.
6
Chapter 4
7
to stop the train at next station for emergency maintenance and avoid
potential derailment. In lifesaving air vents scenario, sensors on vents
monitor air conditions flowing in and out of mines and automatically
change air-flow if conditions become dangerous to miners
IoT and CPSs promise to transform our world with new relationships
between computer-based control and communication systems,
engineered systems and physical reality. Fog computing in this
scenario is built on the concepts of embedded systems in which
software programs and computers are embedded in devices for
reasons other than computation alone. Examples of the devices include
toys, cars, medical devices and machinery. The goal is to integrate the
abstractions and precision of software and networking with the
dynamics, uncertainty and noise in the physical environment. Using
the emerging knowledge, principles and methods of CPSs, we will be
able to develop new generations of intelligent medical devices and
systems, ‘smart’ highways, buildings, factories, agricultural and robotic
systems.
8
Chapter 5
There are various ways to use cloud services to save or store files,
documents and media in remote services that can be accessed
whenever user connect to the Internet. The main problem in cloud is
to maintain security for user’s data in way that guarantees only
authenticated users and no one else gain access to that data. The issue
of providing security to confidential information is core security
problem, that it does not provide level of assurance most people desire.
There are various methods to secure remote data in cloud using
standard access control and encryption methods.
It is good to say that all the standard approaches used
for providing security have been demonstrated to fail from time to time
for a variety of reasons, including faulty implementations, buggy code,
insider attacks, misconfigured services, and the creative construction
of effective and sophisticated attacks not envisioned by the
implementers of security procedures. Building a secure and
trustworthy cloud computing environment is not enough, because
attacks on data continue to happen, and when they do, and information
gets lost, there is no way to get it back. There is a need to get solutions
to such accidents.
The basic idea is that we can limit the damage of stolen data if we
decrease the value of that stolen data to the attacker. We can achieve
this through a „preventive‟ decoy (disinformation) attack. We can
secure Cloud services by implementing given additional security
features.
9
5.1 Decoy System:
Decoy data, such as decoy documents, honey pots and other bogus
information can be generated on demand and used for detecting
unauthorized access to information and to poison the thief’s ex-
filtrated information. Serving decoys will confuse an attacker into
believing they have ex-filtrated useful information, when they have
not. This technology may be integrated with user behavior profiling
technology to secure a user’s data in the Cloud.
10
Fig 3 : Decoy System
11
administrators are able to support location-based mobility demands
and not have to traverse the entire network. Third, these edge (Fog)
systems would be created in such a way that real-time data analytics
become a reality on a truly massive scale.
Seamless integration with the cloud and other services. With Fog
services, we’re able to enhance the cloud experience by isolating user
data that needs to live on the edge. From there, administrators are
able to tie-in analytics, security, or other services directly into their
cloud model.
12
CONCLUSION
13
Future of Fog Computing
14
REFERENCES
1. http://www.cisco.com/web/about/ac50/ac207/crc_new/university/R
FP/rfp13078.html
2. http://www.howtogeek.com/185876/what-is-fog-computing/
3. http://newsroom.cisco.com/feature-
content?type=webcontent&articleId=1365576
4. http://a4academics.com
5. https://en.wikipedia.org/wiki/Cloud_computing
6. https://en.wikipedia.org/wiki/Fog_computing
15