Fog computing
Fog computing
1
CONTENTS
Abstract
Introduction
Existing System
Proposed System
Scenarios
Security Issues
Privacy Issues
Conclusion
Future Enhancement
2
ABSTRACT
Fog Computing is a paradigm that
extends Cloud computing and services
to the edge of the network. Similar to
Cloud, Fog provides data, compute,
storage, and application services to
end-users. The motivation of Fog
computing lies in a series of real
scenarios, such as Smart Grid, smart
traffic lights in vehicular networks and
defined networks.
3
INTRODUCTION
CISCO recently delivered the vision of
fog computing to enable applications
on billions of connected devices to run
directly at the network edge. Customers
can develop, manage and run software
applications on Cisco framework of
networked devices, including hardened
routers and switches. Cisco brings the
open source Linux and network
operating system together in a single
networked device.
4
5
EXISTING
SYSTEMS
Cloud computing has provided
many opportunities for enterprises
by offering their customers a range
of computing services. Current
"pay-as- you-go" Cloud computing
model becomes an efficient
alternative to owning and
managing private data centers for
customers facing Web applications
6
7
DISADVANTAGES
- Existing data protection mechanisms such as encryption was failed in
- Cloud computing security does not focus on ways of secure the data from
unauthorized access.
8
PROPOSED
SYSTEMS
Unlike traditional data centers, Fog
devices are geographically
distributed over heterogeneous
platforms, spanning multiple
management domains. Cisco is
interested in innovative proposals
that facilitate service mobility
across platforms, and technologies
that preserve end-user and content
security and privacy across
domains.
9
ADVANTAGES
Fog can be distinguished from Cloud by its proximity to end-users.
10
11
SECURITY ISSUES
The main security issues are
authentication at different levels of
gateways as well as (in case of smart
grids) at the smart meters installed in
the consumer's home. Each smart meter
and smart appliance has an IP address.
A malicious user can either tamper with
its own smart meter, report false
readings, or spoof IP addresses.
12
EXAMPLE:MAN-IN-
MIDDLE ATTACK
In this subsection, we take man-
in-the-middle attack as an example to
expose the security problems in Fog
computing. In this attack, gateways serving
as Fog devices may be compromised or
replaced by fake ones.
13
PRIVACY ISSUES
14
CONCLUSION
16
THANK YOU
17