Fog Computing (Internet of Things) : Ankit Ap
Fog Computing (Internet of Things) : Ankit Ap
Fog Computing (Internet of Things) : Ankit Ap
(INTERNET OF THINGS)
Prepared By:
Ankit Ap
www.facebook.com/Ank1tAp
CONTENTS
Abstract. User Behavior Profiling.
Introduction. Application of Fog Computing.
Existing System. Decoy System.
Disadvantage Of Existing System. Security And Privacy issues.
Internet Of Things (IOT). Conclusion.
Proposed System. Future Scope & Prediction.
Characteristics. References.
ABSTRACT
• Fog Computing is a paradigm that extends Cloud computing and
services to the edge of the network. Similar to Cloud, Fog provides
data, compute, storage, and application services to end-users. The
motivation of Fog computing lies in a series of real scenarios, such as
Smart Grid, smart traffic lights in vehicular networks and software
defined networks
INTRODUCTION
• Fog computing is a term created by Cisco that refers to extending cloud
computing to the edge of an enterprise's network.
• Cisco introduced its fog computing vision in January 2014 as a way of
bringing cloud computing capabilities to the edge of the network .
• As the result, closer to the rapidly growing number of connected devices
and applications that consume cloud services and generate increasingly
massive amounts of data.
EXISTING SYSTEM
• Cloud computing is a type of
computing that relies on sharing
computing resources rather than
having local servers or personal
devices to handle applications.
Cloud computing is comparable to
grid computing, a type of
computing where unused
processing cycles of all computers in
a network are harnesses to solve
problems too intensive for any
stand-alone machine.
DISADVANTAGE OF EXISTING SYSTEM
• ENCRYPTION WAS FAILED IN SECURING THE DATA FROM THE
ATTACKER.
• IT DOES NOT VERIFY WHETHER THE USER IS AUTHORISED OR NOT.
• NO BODY IS IDENTIFIED WHEN THE ATTACK HAPPENS.
• IT IS COMPLEX TO DETECT WHICH USER IS ATTACK.
• WE CAN’T DETECT WHICH FILE IS BEING HACKED.
• LATENCY TOO HIGH.
• RESILIENCY IMPRACTICAL.
INTERNET OF THINGS (IOT)
• The Internet of Things (IoT) is
the network of physical
objects—devices, vehicles,
buildings and other items
embedded with electronics,
software, sensors, and network
connectivity—that enables
these objects to collect and
exchange data.
PROPOSED SYSTEM
• We proposed a completely new technique to secure user’s data in
cloud using user behavior Profiling and Decoy information
technology called as fog computing.
• SECURITY
• - STRONG SECURITY (HARDWARE ROOT OF TRUST)
• - RESILIENCY/FAULT TOLERANCE.
• PROGRAMMABILITY
• - MULTIPLE APPLICATION SUPPORT.
• - VERSATILITY IN OPERATING ENVIRONMENT.
CHARACTERISTICS
• Greater business agility: With the right tools, developers can quickly
develop fog applications and deploy
them where needed.
• Better security: Protect your fog nodes using the same policy,
controls, and procedures you use in other
parts of your IT environment. Use the same physical security and
ADVANTAGE OF FOG COMPUTING
• ● Deeper insights, with privacy control: Analyze sensitive data locally
instead of sending it to the cloud for
analysis.
http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-
• http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-solutions.pdf
• http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-
understand/#793c56ca6828
• http://www.intel.com/content/www/us/en/internet-of-things/overview.html