Fog Computing Final
Fog Computing Final
TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE AND
ENGINEERING
BY:
GOWTHAMRAJA R
HARI PRASATH G
Jainithish V
FO
COMPUTIN
G
G
PRESENTATION
1
CONTENT
S
Abstract
Introduction
Existing
System
Proposed
System
Scenarios
Security Issues
Privacy Issues
Conclusion
Future 2
ABSTRACT
Fog Computing is a paradigm
that extends Cloud computing
and services to the edge of the
network. Similar to Cloud, Fog
provides data, compute, storage,
and application services to end-
users. The motivation of Fog
computing lies in a series of real
scenarios, such as Smart Grid,
smart traffi c lights in vehicular
networks and defined networks.
3
INTRODUCTION
CISCO recently delivered the
vision of fog computing to enable
applications on billions of
connected devices to run directly
at the network edge. Customers
can develop, manage and run
software applications on Cisco
framework of networked devices,
including hardened routers and
switches. Cisco brings the open
source Linux and network
operating system together in a
single networked device.
4
5
EXISTIN
G
SYSTEM
S
Cloud computing has provided
many opportunities for
enterprises by offering their
customers a range of
computing services. Current
"pay-as- you-go" Cloud
computing model becomes an
efficient alternative to owning
and managing private data
centers for customers facing
Web applications
6
7
DISADVANTAGE
S
- Existing data protection mechanisms such as encryption was
failed in
8
PROPOSED
SYSTEMS
Unlike traditional data centers,
Fog devices are geographically
distributed over heterogeneous
platforms, spanning multiple
management domains. Cisco is
interested in innovative
proposals that facilitate
service mobility across
platforms, and technologies
that preserve end-user and
content security and privacy
across domains.
9
ADVANTAGES
Fog can be distinguished from Cloud by its proximity to end-users.
1
1
SECURITY
ISSUES
The main security issues are
authentication at different levels
of gateways as well as (in case of
smart grids) at the smart meters
installed in the consumer's home.
Each smart meter and smart
appliance has an IP address. A
malicious user can either tamper
with its own smart meter, report
false readings, or spoof IP
addresses.
1
EXAMPLE:MAN-
IN- MIDDLE
ATTACK
In this subsection, we take man-
in-the-middle attack as an example to
expose the security problems in Fog
computing. In this attack, gateways
serving as Fog devices may be
compromised or replaced by fake
ones.
1
PRIVACY ISSUES
1
FUTUR
E
ENHANCEMENTS
Future work will expand on the Fog
computing paradigm in Smart
Grid. In this scenario, two models
for Fog devices can be developed.
Independent Fog devices consult
directly with the Cloud for periodic
updates on price and demands,
while interconnected Fog devices
may consult each other. Next, Fog
computing based SDN in vehicular
networks will receive due attention.
1
CONCLUSION
1
7