0% found this document useful (0 votes)
13 views

Fog computing

The document presents an overview of Fog Computing, a paradigm that extends Cloud computing to the network edge, enhancing services for applications like Smart Grids and IoT. It discusses existing systems, their limitations, and proposes a geographically distributed Fog system that improves security, privacy, and service quality. The document also addresses security and privacy issues, concluding with future enhancements for Fog computing in various domains.

Uploaded by

jainithish07
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Fog computing

The document presents an overview of Fog Computing, a paradigm that extends Cloud computing to the network edge, enhancing services for applications like Smart Grids and IoT. It discusses existing systems, their limitations, and proposes a geographically distributed Fog system that improves security, privacy, and service quality. The document also addresses security and privacy issues, concluding with future enhancements for Fog computing in various domains.

Uploaded by

jainithish07
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

KNOWLEDGE INSTITUTE OF TECHNOLOGY

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


JAGADEEP K C, HARISH B, GOWTHAMRAJA R, HARI PRASATH G
FOG
COMPUTING
PRESENTATION

1
CONTENTS
Abstract
Introduction
Existing System
Proposed System
Scenarios
Security Issues
Privacy Issues
Conclusion
Future Enhancement

2
ABSTRACT
Fog Computing is a paradigm that
extends Cloud computing and services
to the edge of the network. Similar to
Cloud, Fog provides data, compute,
storage, and application services to
end-users. The motivation of Fog
computing lies in a series of real
scenarios, such as Smart Grid, smart
traffic lights in vehicular networks and
defined networks.

3
INTRODUCTION
CISCO recently delivered the vision of
fog computing to enable applications
on billions of connected devices to run
directly at the network edge. Customers
can develop, manage and run software
applications on Cisco framework of
networked devices, including hardened
routers and switches. Cisco brings the
open source Linux and network
operating system together in a single
networked device.

4
5
EXISTING
SYSTEMS
Cloud computing has provided
many opportunities for enterprises
by offering their customers a range
of computing services. Current
"pay-as- you-go" Cloud computing
model becomes an efficient
alternative to owning and
managing private data centers for
customers facing Web applications

6
7
DISADVANTAGES
- Existing data protection mechanisms such as encryption was failed in

securing the data from the attackers.

- It does not verify whether the user was authorized or 107


not.

- Cloud computing security does not focus on ways of secure the data from

unauthorized access.

8
PROPOSED
SYSTEMS
Unlike traditional data centers, Fog
devices are geographically
distributed over heterogeneous
platforms, spanning multiple
management domains. Cisco is
interested in innovative proposals
that facilitate service mobility
across platforms, and technologies
that preserve end-user and content
security and privacy across
domains.

9
ADVANTAGES
Fog can be distinguished from Cloud by its proximity to end-users.

The dense geographical distribution and its support for mobility.

It provides low latency, location awareness, and improves


107 quality-of-services

(QoS) and real time applications.

10
11
SECURITY ISSUES
The main security issues are
authentication at different levels of
gateways as well as (in case of smart
grids) at the smart meters installed in
the consumer's home. Each smart meter
and smart appliance has an IP address.
A malicious user can either tamper with
its own smart meter, report false
readings, or spoof IP addresses.

12
EXAMPLE:MAN-IN-
MIDDLE ATTACK
In this subsection, we take man-
in-the-middle attack as an example to
expose the security problems in Fog
computing. In this attack, gateways serving
as Fog devices may be compromised or
replaced by fake ones.

13
PRIVACY ISSUES

In smart grids, privacy issues deal with


hiding details, such as what appliance
was used at what time, while allowing
correct summary information for
accurate charging.

14
CONCLUSION

Fog computing advantages for services in several


domains, such as Smart Grid, wireless sensor
networks, Internet of Things (IoT) and software
defined networks (SDNs). We examine the
107

state-of-the-art and disclose some general issues in


Fog computing including security. privacy, trust, and
service migration among Fog devices and between
Fog and Cloud.
15
FUTURE
ENHANCEMENTS
Future work will expand on the Fog
computing paradigm in Smart Grid. In
this scenario, two models for Fog
devices can be developed. Independent
Fog devices consult directly with the
Cloud for periodic updates on price
and demands, while interconnected Fog
devices may consult each other. Next,
Fog computing based SDN in vehicular
networks will receive due attention.

16
THANK YOU

17

You might also like