Fog Computing: Seminar Report ON

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

SEMINAR REPORT

ON

FOG COMPUTING
Submitted in partial fulfilment of the requirements

For the degree of Bachelor of Technology in Computer Science


Engineering
Submitted By

Amarnath Baliarsingh
Registration No. : 1601298037
For the
Session 2016-2020

DEPARTMENT OF COMPUTER SCIENCE ENGINEERING

GANDHI INSTITUTE FOR TECHNOLOGY (GIFT)


BHUBANESWAR
Affiliated to

BIJU PATNAIK UNIVERSITY OF TECHNOLOGY ODISHA

i
Certificate

This is to certify that this seminar report entitled “ Fog Computing ” being

submitted by AMARNATH BALIARSINGH bearing Registration No. :

1601298037 in partial fulfilment of the requirement for the award of the

degree of Bachelor Of Technology in Computer Science and Engineering is a

bonafide work carried out at Gandhi Institute For Technology(GIFT).

Co-Ordinator HOD, CSE


Amrutanshu Panigrahi Pratyush Ranjan Mohapatra

ii
ACKNOWLEDGMENT

I earnestly take the responsibility to acknowledge the following


distinguished personalities who graciously allowed carrying out the
Seminar work successfully.
I am highly indebted to our Dr. Satya Prakash Panda, Principal Dr. S.
krishna Mohan Rao, Vice principal Dr. Alok Kumar Mohapatra and
Dean Academics Dr. Pravat Kumar Subudhi for the facilities provided
to accomplish this seminar presentation.
I wish to express my profound sense of appreciation and gratitude to
Prof. Pratyush Ranjan Mohapatra, Head of Computer Science and
Engineering Dept. & also I am thankful to Asst. prof. Amrutanshu
Panigrahi of Department of Computer Science Of Engineering, GIFT,
Bhubaneswar for giving me the opportunity to work under him and
lending every support at every stage of this Seminar work. I truly
appreciate and value his esteemed guidance and encouragement from
the beginning to the end of presentation of the seminar. I am indebted to
his for having helped me shape the problem and providing insights
towards the solution. His trust an support inspired me in the most
important moments of making right decisions and I am glad to work with
him.
I also express my thanks to all my teachers of Computer Science &
Engineering Department for providing a solid background for my studies
and research thereafter.
This Seminar is by far the most significant accomplishment in my life and
it would be impossible without my parents, who supported me and
believed in me.

iii
Contents
s Page No.
ABSTRACT…………………………………...…………...…… v
ACKNOWLEDGEMENT………………………………………. iii
List Of Figures ………………………………………………….. vi
1.INTRODUCTION……………………………………..……… 1
2.CLOUD COMPUTING…………………………………….…. 2
2.1 Introduction……………………………………….…..….. 2
2.2 Disadvantages of Cloud Computing…..……….................. 3
3. FOG COMPUTING……………………………………….…. 4
3.1 Introduction…………………………………………...….. 4
3.2 Characteristics of FOG Computing……..………………... 4
3.3 Why do we need FOG Computing………………………. 5
4.What we can do with FOG……………………..……………... 7
5. Security in FOG Computing………………….……….…........ 9
5.1 Decoy System…………………………………...………... 10
5.2 Advantages of FOG Computing……………..…………… 11
CONCLUSION…………………………………………….…… 13
FUTURE SCOPE………………………………………….……. 14
REFERENCES…………………………………………….…..... 15

iv
ABSTRACT

Fog computing is not a replacement of cloud it is just extends the cloud


computing by providing security in the cloud environment. Similar to Cloud,
Fog provides data, compute, storage, and application services to end-users.

Cloud computing promises to significantly change the way of use


computers and store our personal and business information .With these new
computing and communication paradigms arise new data security
challenges . Existing data protection mechanisms such as Encryption have
failed to protect the data in the cloud from unauthorized access.

We proposed a different approach for securing data in the cloud using


offensive decoy technology. We monitor data access in the cloud and detect
abnormal data access patterns.When unauthorized access is suspected and
then verified using challenge questions, we launch a disinformation attack
by returning large amounts of decoy information to the attacker. This
protects against the misuse of the user’s real data. Experiments conducted in
a local file setting provide evidence that this approach may provide
unprecedented levels of user data security in a Cloud environment.

Also I’m going to elaborate the motivation and advantages of Fog


computing, and analyze its applications in a series of real scenarios, such as
smart traffic lights in vehicular networks and software defined networks

v
List Of Figures
Page No.

1. Cloud Computing……………………………………..……… 2
2. Fog Computing…………………………………….………… 4
3. Decoy System …………………………………….………….. 11

vi
Chapter 1

INTRODUCTION

CISCO recently delivered the vision of fog computing to enable


applications on billions of connected devices, already connected in the
Internet of Things (IoT), to run directly at the network edge. Customers
can develop, manage and run software applications on Cisco IOx
framework of networked devices, including hardened routers,
switches and IP video cameras. Cisco IOx brings the open source Linux
and Cisco IOS network operating system together in a single
networked device (initially in routers). The open application
environment encourages more developers to bring their own
applications and connectivity interfaces at the edge of the network.
Cloud computing has become the buzz word during the
recent years. But it largely depends on servers which are available in a
remote location, resulting in slow response time and also scalability
issues. Response time and scalability plays a crucial role in machine to
machine communication and services. The edge computing platform
solves the problems by the simple idea of locating small servers called
edges servers in the vicinity of the users and devices and passing to the
servers some of the load of center servers and/or user’s devices.

1
Chapter 2

WHAT IS CLOUD COMPUTNG?

2.1. CLOUD COMPUTNG

Fig 1: CLOUD COMPUTING

Cloud computing is a delivery platform which promises a new way


of accessing and storing personal as well as business information.
Cloud computing refers to the practice of transitioning computer

2
services such as computation or data storage to multiple redundant
offsite locations available on the Internet, which allows application
software to be operated using internet-enabled devices.
In Existing data protection mechanisms such as encryption was
failed in securing the data from the attacker. It does not verify whether
the user was authorized or not.
Cloud computing security does not focus on ways of secure the data
from unauthorized access.
In 2009 we have our own confidential documents in the cloud. This
file does not have much security. so, hacker gains access the
documents. Twitter incident is one example of a data theft attack in the
Cloud.

2.2. Disadvantages
 No body is identified when the attack is happen.
 It is complex to detect which user is attack.
 We can not detect which file was hacking.
 Cloud Computing Issue: Bandwidth
Transmitting and processing data requires bandwidth . The
more data, the more bandwidth is needed. Current cloud computing
models can’t keep up with the amount of bandwidth that will be
needed.

3
Chapter 3

WHAT IS FOG COMPUTING?

3.1. FOG COMPUTING

Fig 2: Fog Computing

Fog computing is a model in which data, processing and applications


are concentrated in devices at the network edge rather than existing
almost entirely in the cloud.Fog Computing is a paradigm that extends
Cloud Computing and services to the edge of the network, similar to
Cloud, Fog provides data, compute, storage, and application services to
end-users.

Fog computing is a paradigm which extends cloud computing


paradigm to the edge of the network. Terms Edge Computing and Fog
Computing are often used interchangeably. Similar to Cloud, Fog
provides data, compute, storage, and application services to end-users.
This enables new breed of applications and services.

4
3.2. CHARACTERISTICS OF FOG COMPUTING :

 Proximity to end-users, its


 Dense geographical distribution
 Support for mobility.

Fog reduces service latency, and improves QoS (Quality of Service),


resulting in superior user-experience. Fog Computing supports
emerging Internet of Everything (IoE) applications that demand real-
time/predictable latency (industrial automation, transportation,
networks of sensors and actuators). Fog paradigm is well positioned
for real time Big Data and real time analytics, it supports densely
distributed data collection points, hence adding a fourth axis to the
often mentioned Big Data dimensions (volume, variety, and velocity).
Unlike traditional data centers, Fog devices are
geographically distributed over heterogeneous platforms, spanning
multiple management domains. That means data can be processed
locally in smart devices rather than being sent to the cloud for
processing.

3.3. WHY DO WE NEED FOG COMPUTING?

In the past few years, Cloud computing has provided many


opportunities for enterprises by offering their customers a range of
computing services. Current “pay-as-you-go” Cloud computing model
becomes an efficient alternative to owning and managing private data
centers for customers facing Web applications and batch processing
Cloud computing frees the enterprises and their end users from the
specification of many details, such as storage resources, computation
limitation and network communication cost.
However, this bliss becomes a problem for latency-
sensitive applications, which require nodes in the vicinity to meet their
delay requirements. When techniques and devices of IoT are getting

5
more involved in people’s life, current Cloud computing paradigm can
hardly satisfy their requirements of mobility support, location
awareness and low latency.
Fog computing is proposed to address the above
problem. As Fog computing is implemented at the edge of the network,
it provides low latency, location awareness, and improves quality-of-
services (QoS) for streaming and real time applications. Typical
examples include industrial automation, transportation, and networks
of sensors and actuators. Moreover, this new infrastructure supports
heterogeneity as Fog devices include end-user devices, access points,
edge routers and switches. The Fog paradigm is well positioned for real
time big data analytics, supports densely distributed data collection
points, and provides advantages in entertainment, advertising,
personal computing and other applications.

6
Chapter 4

WHAT CAN WE DO WITH FOG?

We elaborate on the role of Fog computing in the following motivating


scenarios. The advantages of Fog computing satisfy the requirements
of applications in these scenarios.

Smart Traffic Lights and Connected Vehicles:

Video camera that senses an ambulance flashing lights can


automatically change street lights to open lanes for the vehicle to pass
through traffic. Smart street lights interact locally with sensors and
detect presence of pedestrian and bikers, and measure the distance
and speed of approaching vehicles. Intelligent lighting turns on once a
sensor identifies movement and switches off as traffic passes.
Neighboring smart lights serving as Fog devices coordinate to create
green traffic wave and send warning signals to approaching vehicles.
Wireless access points like Wi-Fi, 3G, road-side units and smart traffic
lights are deployed along the roads. Vehicles-to Vehicle, vehicle to
access points, and access points to access points interactions enrich the
application of this scenario.

Wireless Sensor and Actuator Networks:

Traditional wireless sensor networks fall short in applications that go


beyond sensing and tracking, but require actuators to exert physical
actions like opening, closing or even carrying sensors. In this scenario,
actuators serving as Fog devices can control the measurement process
itself, the stability and the oscillatory behaviours by creating a closed-
loop system. For example, in the scenario of self-maintaining trains,
sensor monitoring on a train’s ball-bearing can detect heat levels,
allowing applications to send an automatic alert to the train operator

7
to stop the train at next station for emergency maintenance and avoid
potential derailment. In lifesaving air vents scenario, sensors on vents
monitor air conditions flowing in and out of mines and automatically
change air-flow if conditions become dangerous to miners

IoT and Cyber-physical systems (CPSs):

Fog computing based systems are becoming an important class of IoT


and CPSs. Based on the traditional information carriers including
Internet and telecommunication network, IoT is a network that can
interconnect ordinary physical objects with identified address. CPSs
feature a tight combination of the system’s computational and physical
elements. CPSs also coordinate the integration of computer and
information centric physical and engineered systems.

IoT and CPSs promise to transform our world with new relationships
between computer-based control and communication systems,
engineered systems and physical reality. Fog computing in this
scenario is built on the concepts of embedded systems in which
software programs and computers are embedded in devices for
reasons other than computation alone. Examples of the devices include
toys, cars, medical devices and machinery. The goal is to integrate the
abstractions and precision of software and networking with the
dynamics, uncertainty and noise in the physical environment. Using
the emerging knowledge, principles and methods of CPSs, we will be
able to develop new generations of intelligent medical devices and
systems, ‘smart’ highways, buildings, factories, agricultural and robotic
systems.

8
Chapter 5

SECURITY IN FOG COMPUTING:

There are various ways to use cloud services to save or store files,
documents and media in remote services that can be accessed
whenever user connect to the Internet. The main problem in cloud is
to maintain security for user’s data in way that guarantees only
authenticated users and no one else gain access to that data. The issue
of providing security to confidential information is core security
problem, that it does not provide level of assurance most people desire.
There are various methods to secure remote data in cloud using
standard access control and encryption methods.
It is good to say that all the standard approaches used
for providing security have been demonstrated to fail from time to time
for a variety of reasons, including faulty implementations, buggy code,
insider attacks, misconfigured services, and the creative construction
of effective and sophisticated attacks not envisioned by the
implementers of security procedures. Building a secure and
trustworthy cloud computing environment is not enough, because
attacks on data continue to happen, and when they do, and information
gets lost, there is no way to get it back. There is a need to get solutions
to such accidents.

The basic idea is that we can limit the damage of stolen data if we
decrease the value of that stolen data to the attacker. We can achieve
this through a „preventive‟ decoy (disinformation) attack. We can
secure Cloud services by implementing given additional security
features.

9
5.1 Decoy System:
Decoy data, such as decoy documents, honey pots and other bogus
information can be generated on demand and used for detecting
unauthorized access to information and to poison the thief’s ex-
filtrated information. Serving decoys will confuse an attacker into
believing they have ex-filtrated useful information, when they have
not. This technology may be integrated with user behavior profiling
technology to secure a user’s data in the Cloud.

Whenever abnormal and unauthorized access to a cloud service is


noticed, decoy information may be returned by the Cloud and
delivered in such a way that it appear completely normal and
legitimate. The legitimate user, who is the owner of the information,
would readily identify when decoy information is being returned by
the Cloud, and hence could alter the Cloud’s responses through a
variety of means, such as challenge questions, to inform the Cloud
security system that it has incorrectly detected an unauthorized
access. In the case where the access is correctly identified as an
unauthorized access, the Cloud security system would deliver
unbounded amounts of bogus information to the attacker, thus
securing the user’s true data from can be implemented by given two
additional security features:

1. Validating whether data access is authorized when abnormal information


access is detected
2. Confusing the attacker with bogus information that is by providing decoy
documents.

10
Fig 3 : Decoy System

We have applied above concepts to detect unauthorized data


access to data stored on a local file system by masqueraders, i.e.
attackers who view of legitimate users after stealing their credentials.
Our experimental results in a local file system setting show that
combining both techniques can yield better detection results .This
results suggest that this approach may work in a Cloud environment,
to make cloud system more transparent to the user as a local file
system.

5.2 Advantages of Fog computing

 Bringing data close to the user. Instead of housing information at


data center sites far from the end-point, the Fog aims to place the
data close to the end-user.

 Creating dense geographical distribution. First of all, big data and


analytics can be done faster with better results. Second,

11
administrators are able to support location-based mobility demands
and not have to traverse the entire network. Third, these edge (Fog)
systems would be created in such a way that real-time data analytics
become a reality on a truly massive scale.

 True support for mobility and the IoT. By controlling data at


various edge points, Fog computing integrates core cloud services
with those of a truly distributed data center platform. As more
services are created to benefit the end-user, edge and Fog networks
will become more prevalent.

 Numerous verticals are ready to adopt. Many organizations are


already adopting the concept of the Fog. Many different types of
services aim to deliver rich content to the end-user. This spans IT
shops, vendors, and entertainment companies as well.

 Seamless integration with the cloud and other services. With Fog
services, we’re able to enhance the cloud experience by isolating user
data that needs to live on the edge. From there, administrators are
able to tie-in analytics, security, or other services directly into their
cloud model.

12
CONCLUSION

In Fog Computing we presenting a new approach for solving the


problem of insider data theft attacks in a cloud using dynamically
generated decoy files and also saving storage required for maintaining
decoy files in the cloud. So by using decoy technique in Fog can
minimize insider attacks in cloud.

13
Future of Fog Computing

With the increase in data and cloud services utilization, Fog


Computing will play a key role in helping reduce latency and improving
the user experience. We are now truly distributing the data plane and
pushing advanced services to the edge. By doing so, administrators are
able to bring rich content to the user faster, more efficiently, and – very
importantly – more economically. This, ultimately, will mean better
data access, improved corporate analytics capabilities, and an overall
improvement in the end-user computing experience
Cisco’s Ginny Nichols coined the term fog computing.
The metaphor comes from the fact that fog is the cloud close to the
ground, just as fog computing concentrates processing at the edge of
the network. According to Cisco, fog computing extends from the edge
to the cloud, in a geographically distributed and hierarchical
organization.
“Fog could take a burden off the network. As 50 billion
objects become connected worldwide by 2020, it will not make sense
to handle everything in the cloud. Distributed apps and edge-
computing devices need distributed resources. Fog brings
computation to the data. Low-power devices, close to the edge of the
network, can deliver real-time response”says Technical Leader
Rodolfo Milito, one of Cisco’s thought leaders in fog computing.
“The Internet of Everything is changing how we
interact with the real world,” Milito added:“Things that were totally
disconnected from the Internet before, such as cars, are now merging
onto it. But as we go from one billion endpoints to one trillion
endpoints worldwide, that creates not only a real scalability problem
but the challenge of dealing with complex clusters of endpoints – what
we call ‘rich systems’ – rather than dealing with individual endpoints.
Fog’s hardware infrastructure and software platform helps solve that.”

14
REFERENCES

1. http://www.cisco.com/web/about/ac50/ac207/crc_new/university/R
FP/rfp13078.html

2. http://www.howtogeek.com/185876/what-is-fog-computing/

3. http://newsroom.cisco.com/feature-
content?type=webcontent&articleId=1365576

4. http://a4academics.com

5. https://en.wikipedia.org/wiki/Cloud_computing

6. https://en.wikipedia.org/wiki/Fog_computing

15

You might also like