0% found this document useful (0 votes)
26 views18 pages

Fog Computing Final

The document discusses Fog Computing, a paradigm that extends Cloud computing to the network edge, providing services to connected devices. It highlights the advantages of Fog over traditional Cloud systems, such as low latency and enhanced security, while also addressing existing security and privacy issues. Future enhancements in Fog computing, particularly in Smart Grid and vehicular networks, are proposed to improve service delivery and user privacy.

Uploaded by

jainithish07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views18 pages

Fog Computing Final

The document discusses Fog Computing, a paradigm that extends Cloud computing to the network edge, providing services to connected devices. It highlights the advantages of Fog over traditional Cloud systems, such as low latency and enhanced security, while also addressing existing security and privacy issues. Future enhancements in Fog computing, particularly in Smart Grid and vehicular networks, are proposed to improve service delivery and user privacy.

Uploaded by

jainithish07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

KNOWLEDGE INSTITUTE OF

TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND
ENGINEERING
BY:
GOWTHAMRAJA R
HARI PRASATH G
Jainithish V
FO
COMPUTIN
G
G
PRESENTATION

1
CONTENT
S
Abstract
Introduction
Existing
System
Proposed
System
Scenarios
Security Issues
Privacy Issues
Conclusion
Future 2
ABSTRACT
Fog Computing is a paradigm
that extends Cloud computing
and services to the edge of the
network. Similar to Cloud, Fog
provides data, compute, storage,
and application services to end-
users. The motivation of Fog
computing lies in a series of real
scenarios, such as Smart Grid,
smart traffi c lights in vehicular
networks and defined networks.

3
INTRODUCTION
CISCO recently delivered the
vision of fog computing to enable
applications on billions of
connected devices to run directly
at the network edge. Customers
can develop, manage and run
software applications on Cisco
framework of networked devices,
including hardened routers and
switches. Cisco brings the open
source Linux and network
operating system together in a
single networked device.
4
5
EXISTIN
G
SYSTEM
S
Cloud computing has provided
many opportunities for
enterprises by offering their
customers a range of
computing services. Current
"pay-as- you-go" Cloud
computing model becomes an
efficient alternative to owning
and managing private data
centers for customers facing
Web applications

6
7
DISADVANTAGE
S
- Existing data protection mechanisms such as encryption was
failed in

securing the data from the attackers.

- It does not verify whether the user was authorized or n ot.


07

-Cloud computing security does not focus on ways of secure the

data from unauthorized access.

8
PROPOSED
SYSTEMS
Unlike traditional data centers,
Fog devices are geographically
distributed over heterogeneous
platforms, spanning multiple
management domains. Cisco is
interested in innovative
proposals that facilitate
service mobility across
platforms, and technologies
that preserve end-user and
content security and privacy
across domains.
9
ADVANTAGES
Fog can be distinguished from Cloud by its proximity to end-users.

The dense geographical distribution and its support for mobility.

It provides low latency, location awareness, and improv e s quality-


1 07

of-services (QoS) and real time applications.

1
1
SECURITY
ISSUES
The main security issues are
authentication at different levels
of gateways as well as (in case of
smart grids) at the smart meters
installed in the consumer's home.
Each smart meter and smart
appliance has an IP address. A
malicious user can either tamper
with its own smart meter, report
false readings, or spoof IP
addresses.
1
EXAMPLE:MAN-
IN- MIDDLE
ATTACK
In this subsection, we take man-
in-the-middle attack as an example to
expose the security problems in Fog
computing. In this attack, gateways
serving as Fog devices may be
compromised or replaced by fake
ones.

1
PRIVACY ISSUES

In smart grids, privacy issues deal


with hiding details, such as what
appliance was used at what time,
while allowing correct summary
information for accurate
charging.

1
FUTUR
E
ENHANCEMENTS
Future work will expand on the Fog
computing paradigm in Smart
Grid. In this scenario, two models
for Fog devices can be developed.
Independent Fog devices consult
directly with the Cloud for periodic
updates on price and demands,
while interconnected Fog devices
may consult each other. Next, Fog
computing based SDN in vehicular
networks will receive due attention.
1
CONCLUSION

Fog computing advantages for services in


several domains, such as Smart Grid,
wireless sensor networks, Internet of Things
(IoT) and software defined networks
(SDNs). We examine the
state-of-the-art and disclose some general
issues in Fog computing including security.
privacy, trust, and service migration among
Fog devices and between Fog and Cloud. 1
5
THANK
YOU

1
7

You might also like