Module IV
Module IV
Introduction to
Fog Computing
Module IV
Content
❖ Fog Integration Technologies ❖ Fog-IoT:
with IoT ✔ Architectural model,
✔ Security Management for Edge Cloud Architectures ✔ Challenges on IoT Stack Model via
TCP/IP Architecture,
✔ Fog Computing Realization for Big Data Analytics
✔ Data Management,
✔ Data Analytics in the Fog, Prototypes and Evaluation
✔ Security and privacy issues
❖ Case Study:
❖ Intelligent Traffic Lights Management (ITLM) System
❖ Real-time Processing:
Suitable for applications requiring
instant responses, such as IoT and
AI.
Security Management for Edge Cloud
Architectures
Components of Edge Clouds
3. Anycast DNS:
✔ Use Anycast DNS to distribute DNS resolution requests across multiple servers in different
locations.
✔ This helps distribute the load and mitigate DDoS attacks targeting DNS infrastructure.
Security Management for Edge Cloud
Architectures
4. Web Application Firewalls
(WAF):
✔ Employ WAFs to inspect and filter HTTP
traffic, blocking malicious requests and
payloads that are indicative of DDoS
attacks.
✔ Configure WAFs to detect and mitigate
common DDoS attack vectors, such as
HTTP floods and application layer
attacks.
Questions
1. How would you design security policies for edge cloud architectures to
ensure data integrity and confidentiality?
2. How do you address the unique security challenges posed by the
distributed nature of edge cloud architectures?
3. How would you implement secure device onboarding and
authentication in edge cloud architectures?
4. How do you manage security updates and patches in a large-scale
edge cloud deployment?
Answers
1. How would you design security policies for edge cloud architectures to
ensure data integrity and confidentiality?
❖ Security policies for edge cloud architectures should include
✔ Encryption protocols for data in transit
✔ Access control mechanisms, and regular security audits.
✔ Implementing secure communication channels, such as TLS/SSL, and
using encryption algorithms for sensitive data helps maintain data integrity
and confidentiality.
Answers
2. How do you address the unique security challenges posed by the
distributed nature of edge cloud architectures?
❖The distributed nature of edge cloud architectures requires a
comprehensive approach. This includes
✔ Deploying security measures at each edge node, implementing
secure communication protocols, and leveraging edge-specific
security solutions.
✔ Additionally, centralized security management tools can be used to
monitor and respond to security events across the distributed edge
infrastructure.
Answers
3. How would you implement secure device onboarding and authentication
in edge cloud architectures?
•Spark: An open-source, distributed computing system for big data processing and
analytics.
•NoSQL Databases: Such as MongoDB, Cassandra, and Couchbase, which are used
for storing and retrieving unstructured or semi-structured data.
•Machine Learning Libraries: Like TensorFlow and scikit-learn, used for building
predictive models.
•Data Visualization Tools: Such as Tableau, Power BI, and D3.js, for presenting
insights in a visually understandable format.
Questions
1. How does the shift from centralized cloud analytics to edge analytics in
fog computing impact the design and implementation of big data
analytics algorithms?
2. How can big data analytics algorithms be optimized to efficiently utilize
the limited computational resources available in fog computing
environments, considering the constraints of edge devices?
3. How do considerations for data movement and storage change when
implementing big data analytics at the edge in fog computing, and
what impact does this have on latency and bandwidth?
Answers
1. How does the shift from centralized cloud analytics to edge analytics in
fog computing impact the design and implementation of big data analytics
algorithms?
❖ Edge analytics introduces challenges related to
✔ Resource constraints,
✔ Data variability, and
✔ The need for lightweight algorithms that can operate efficiently on edge
devices.
Answers
2. How can big data analytics algorithms be optimized to efficiently utilize
the limited computational resources available in fog computing
environments, considering the constraints of edge devices?
▪ Use Natural Language Processing (NLP) techniques to classify and analyze text data.
▪ Analyze social network data in real-time to identify trends, influential users, and potential
viral content.
▪ Use graph analytics and machine learning to extract insights from social media data.
Fog Computing Realization for Big Data
Analytics
Real-time sentiment analysis involves analyzing text data in real-time to
determine the sentiment or emotional tone expressed.
Objectives: To understand customer opinions, feedback, and reactions on
social media, reviews, or other text sources. - To improve Business
1.Data Collection:
▪ Set up a data pipeline to collect real-time data from social media
platforms, customer reviews, or any other relevant sources.
▪ Use APIs or web scraping techniques to continuously fetch new data.
Fog Computing Realization for Big Data
Analytics
2. Data Preprocessing:
▪ Clean and preprocess the text data by removing noise, handling
missing values, and standardizing the format.
▪ Tokenize the text into words or phrases for analysis.
3. Sentiment Analysis Model:
▪ Choose or build a sentiment analysis model. You can use pre-trained
models or train your own model using sample data.
▪ Fine-tune the model on a sentiment analysis dataset to adapt it to your
specific domain.
Fog Computing Realization for Big Data
Analytics
4. Real-time Analysis:
▪ Implement a real-time analysis component that continuously processes
incoming data.
▪ Use the trained model to predict sentiment for each piece of incoming
text in real-time.
5. Visualization:
▪ Create a dashboard or visualization tool to display real-time sentiment
trends.
▪ Include features such as sentiment distribution, sentiment over time,
and other relevant visualizations.
Fog Computing Realization for Big Data
Analytics
6. Alerts and Notifications:
▪ Implement an alerting system to notify stakeholders when there is a
significant shift in sentiment.
▪ Set up thresholds for positive or negative sentiment and trigger alerts
accordingly.
7. Feedback Loop:
▪ Implement a feedback loop to continuously improve the model.
▪ Allow users to provide feedback on the accuracy of sentiment
predictions, and use this feedback to retrain the model periodically.
Internet of Things
❖The internet of things, or IoT, is a system of interrelated
computing devices, mechanical and digital machines,
objects, animals or people that are provided with
unique identifiers (UIDs) and the ability to transfer data
over a network without requiring human-to-human or
human-to-computer interaction.
37
Sensors:
❖ A sensor or device is an important
component for gathering live data from
the surrounding environment.
❖ The nature of this data can vary.
❖ This could be as simple as your phone
having a temperature sensor, GPS, an
accelerometer, or as complex as a live
video feature on a social media platform.
❖ Sensors make it possible for IoT devices
to connect to the real world and
environment.
38
Connectivity
❖ Upon collection, all data is sent to a cloud
infrastructure.
❖ This could be done by connecting the sensors
to the cloud using a variety of communication
mediums such as mobile or satellite networks,
Bluetooth, WI-FI, WAN, etc.
❖ Various IoT devices use different types of
connectivity.
39
Data Processing:
Data Processing:
❖ Once the data has been
collected, and has reached the
cloud, it is the responsibility of the
data processors to process it.
❖ Data processing software can
enhance IoT devices in a wide
range of ways, from adjusting the
temperature of the air conditioner
to recognizing faces on mobile
phones.
40
User Interface
42
Why we need Internet of Things (IoT)
• Over the past few years, IoT has become one of the most important
technologies of the 21st century.
• Now that we can connect everyday objects—kitchen appliances, cars,
thermostats, baby monitors—to the internet via embedded devices’
• So seamless communication is possible between people, processes, and
things.
• By means of low-cost computing, the cloud, big data, analytics, and mobile
technologies, physical things can share and collect data with minimal human
intervention.
43
Advantages of IoT
• Ability to access information from anywhere at any time on any device;
• Improved communication between connected electronic devices;
• Transferring data packets over a connected network saving time and
money; and
• Automating tasks helping to improve the quality of a business's
services and reducing the need for human intervention.
44
Disadvantages IoT
• As the number of connected devices increases and more information
is shared between devices, the potential that a hacker could steal
confidential information also increases.
• Enterprises may eventually have to deal with massive numbers --
maybe even millions -- of IoT devices, and collecting and managing
the data from all those devices will be challenging.
• If there's a bug in the system, it's likely that every connected device
will become corrupted.
• Since there's no international standard of compatibility for IoT, it's
difficult for devices from different manufacturers to communicate with
each other.
45
Key Features
46
Key Features
AI − IoT essentially makes virtually anything “smart”, meaning it enhances
every aspect of life with the power of data collection, artificial intelligence
algorithms, and networks. This can mean something as simple as enhancing
your refrigerator and cabinets to detect when milk and your favourite cereal
run low, and to then place an order with your preferred grocer.
Connectivity − New enabling technologies for networking, and specifically IoT
networking, mean networks are no longer exclusively tied to major providers.
Networks can exist on a much smaller and cheaper scale while still being
practical. IoT creates these small networks between its system devices.
Sensors − IoT loses its distinction without sensors. They act as defining
instruments which transform IoT from a standard passive network of devices
into an active system capable of real-world integration. 47
Active Engagement − Much of today's interaction with connected technology
happens through passive engagement. IoT introduces a new paradigm for
active content, product, or service engagement.
Small Devices − Devices, as predicted, have become smaller, cheaper, and
more powerful over time. IoT exploits purpose-built small devices to deliver
services.