SlideShare a Scribd company logo
FOG COMPUTING
CONTENTS:
 Abstract.
 Introduction.
 Existing System.
 Proposed System.
 Scenarios.
 Security Issues.
 Example.
 Privacy Issues.
 Conclusion.
 Future Enhancement.
 References.
ABSTRACT:
Fog Computing is a paradigm that extends
Cloud computing and services to the edge of the network. Similar
to Cloud, Fog provides data, compute, storage, and application
services to end-users. The motivation of Fog computing lies in a series
of real scenarios, such as Smart Grid, smart traffic lights in vehicular
networks and software defined networks.
INTRODUCTION:
CISCO recently delivered the vision of fog
computing to enable applications on billions of connected devices to run
directly at the network edge. Customers can develop, manage and run
software applications on Cisco framework of networked devices, including
hardened routers and switches. Cisco brings the open source Linux and
network operating system together in a single networked device.
Fog
Cloud
Locations
Edge
Core
A simple three level hierarchy as shown in above Figure.
In this framework, each smart thing is attached to one of Fog devices. Fog
devices could be interconnected and each of them is linked to the Cloud.
EXISTING SYSTEM
 Cloud computing has provided many opportunities for enterprises by
offering their customers a range of computing services. Current “pay-as-
you-go” Cloud computing model becomes an efficient alternative to owning
and managing private data centers for customers facing Web applications
DISADVANTAGES:
 Existing data protection mechanisms such as encryption was failed in
securing the data from the attackers.
 It does not verify whether the user was authorized or not.
 Cloud computing security does not focus on ways of secure the data from
unauthorized access.
PROPOSED SYSTEM
 Unlike traditional data centers, Fog
devices are geographically
distributed over heterogeneous
platforms, spanning multiple
management domains. Cisco is
interested in innovative proposals
that facilitate service mobility across
platforms, and technologies that
preserve end-user and content
security and privacy across domains.
ADVANTAGES:
 Fog can be distinguished from Cloud by its proximity to end-users.
 The dense geographical distribution and its support for mobility.
 It provides low latency, location awareness, and improves quality-of-
services (QoS) and real time applications.
Scenarios
Smart
grid
Smart
Traffic
Lights
Wireless
Sensor
Decentral
ized
Smart
Building
Control
Internet
of Things
Software
Defined
Networks
SECURITY ISSUES:
The main security issues are authentication at different
levels of gateways as well as (in case of smart grids) at the smart meters
installed in the consumer’s home. Each smart meter and smart appliance
has an IP address. A malicious user can either tamper with its own smart
meter, report false readings, or spoof IP addresses.
EXAMPLE : MAN-IN –MIDDLE-ATTACK
In this subsection, we take man- in-the-middle attack as
an example to expose the security problems in Fog computing. In this
attack, gateways serving as Fog devices may be compromised or replaced by
fake ones .
PRIVACY ISSUES:
In smart grids, privacy issues deal with hiding details, such
as what appliance was used at what time, while allowing correct
summary information for accurate charging.
CONCLUSION:
Fog computing advantages for services in several domains,
such as Smart Grid, wireless sensor networks, Internet of Things (IoT)
and software defined networks (SDNs). We examine the state- of-the-art
and disclose some general issues in Fog computing including security,
privacy, trust, and service migration among Fog devices and between Fog
and Cloud.
FUTURE ENCHANCEMENT:
• Future work will expand on the Fog computing paradigm in Smart Grid. In
this scenario, two models for Fog devices can be developed. Independent
Fog devices consult directly with the Cloud for periodic updates on price
and demands, while interconnected Fog devices may consult each other.
• Next, Fog computing based SDN in vehicular networks will receive due
attention.
REFERENCES :
[1] F. Bonomi, “Connected vehicles, the internet of things, and fog com-
puting,” in The Eighth ACM International Workshop on Vehicular Inter-
Networking (VANET), Las Vegas, USA, 2011.
[2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its
role in the internet of things,” in Proceedings of the First Edition of the MCC
Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.
FOG COMPUTING

More Related Content

FOG COMPUTING

  • 2. CONTENTS:  Abstract.  Introduction.  Existing System.  Proposed System.  Scenarios.  Security Issues.  Example.  Privacy Issues.  Conclusion.  Future Enhancement.  References.
  • 3. ABSTRACT: Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
  • 4. INTRODUCTION: CISCO recently delivered the vision of fog computing to enable applications on billions of connected devices to run directly at the network edge. Customers can develop, manage and run software applications on Cisco framework of networked devices, including hardened routers and switches. Cisco brings the open source Linux and network operating system together in a single networked device.
  • 6. A simple three level hierarchy as shown in above Figure. In this framework, each smart thing is attached to one of Fog devices. Fog devices could be interconnected and each of them is linked to the Cloud.
  • 7. EXISTING SYSTEM  Cloud computing has provided many opportunities for enterprises by offering their customers a range of computing services. Current “pay-as- you-go” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications
  • 8. DISADVANTAGES:  Existing data protection mechanisms such as encryption was failed in securing the data from the attackers.  It does not verify whether the user was authorized or not.  Cloud computing security does not focus on ways of secure the data from unauthorized access.
  • 9. PROPOSED SYSTEM  Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous platforms, spanning multiple management domains. Cisco is interested in innovative proposals that facilitate service mobility across platforms, and technologies that preserve end-user and content security and privacy across domains.
  • 10. ADVANTAGES:  Fog can be distinguished from Cloud by its proximity to end-users.  The dense geographical distribution and its support for mobility.  It provides low latency, location awareness, and improves quality-of- services (QoS) and real time applications.
  • 12. SECURITY ISSUES: The main security issues are authentication at different levels of gateways as well as (in case of smart grids) at the smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses.
  • 13. EXAMPLE : MAN-IN –MIDDLE-ATTACK In this subsection, we take man- in-the-middle attack as an example to expose the security problems in Fog computing. In this attack, gateways serving as Fog devices may be compromised or replaced by fake ones .
  • 14. PRIVACY ISSUES: In smart grids, privacy issues deal with hiding details, such as what appliance was used at what time, while allowing correct summary information for accurate charging.
  • 15. CONCLUSION: Fog computing advantages for services in several domains, such as Smart Grid, wireless sensor networks, Internet of Things (IoT) and software defined networks (SDNs). We examine the state- of-the-art and disclose some general issues in Fog computing including security, privacy, trust, and service migration among Fog devices and between Fog and Cloud.
  • 16. FUTURE ENCHANCEMENT: • Future work will expand on the Fog computing paradigm in Smart Grid. In this scenario, two models for Fog devices can be developed. Independent Fog devices consult directly with the Cloud for periodic updates on price and demands, while interconnected Fog devices may consult each other. • Next, Fog computing based SDN in vehicular networks will receive due attention.
  • 17. REFERENCES : [1] F. Bonomi, “Connected vehicles, the internet of things, and fog com- puting,” in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011. [2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16.

Editor's Notes

  1. What is the project about? Define the goal of this project Is it similar to projects in the past or is it a new effort? Define the scope of this project Is it an independent project or is it related to other projects? * Note that this slide is not necessary for weekly status meetings
  2. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.