Dept - of E&Ce 2019-2020
Dept - of E&Ce 2019-2020
CHAPTER 1
INTRODUCTION
Fog computing also known as fogging is a distributed computing infrastructure in which some
application services are handled at the network edge in a smart device. Fog computing is a
paradigm which monitors the data and helps in detecting an unauthorized access. According to
Cisco, due to its wide geographical distribution the Fog computing is well suited for real time
analysis and big data. Fog computing involves a dense geographical distribution of network and
provides a feature of location access. With this any unauthorized activity in the cloud network
can be detected. To get the benefit of this technique a user need to get registered with the fog.
Once the user is ready by filling up the sign up form he will get the message or email that he is
ready to take the services from fog computing. The main task of fog is to deliver data and place it
closer to the user who is positioned at a location which at the edge of network. Here the term
edge refers to different nodes to which the end user is connected and it is also called edge
computing.
Fog computing is a paradigm which extends cloud computing and services to the edge of the
network. Terms Edge Computing and Fog Computing are often used interchangeably. Similar to
Cloud, Fog provides data, compute, storage, and application services to end-users. This enables
new breed of applications and services.
Figure 1.1 shows the idea of fog computing. It structures a way to handle devices, these devices
can communicate with each other or directly with the cloud in some cases. Edge devices are
smart devices which have Internet connectivity; for example, smart phones, tablets, laptops,
traffic lights, vehicles, homes devices, etc. A Fog Computing platform provides low-latency
virtualized services and is linked with the Cloud Computing infrastructure. There are many edge
devices, a Fog Computing platform manages and controls these devices and the cloud providers
are fewer in number. Size, storage capacity, processing capabilities, and latency increase as we
move upward in the system. The Fog acts as an intermediate layer between the Edge Devices and
the Cloud. Edge devicesrequest compute, storage and communication services from the Fog. The
Fog provides local, low latency response to these requests and forwards relevant data for
computationally intensive processing, long term analytics and persistent storage over to the
cloud.
CHAPTER 2
In the past few years, Cloud computing has provided many opportunities for enterprises by
offering their customers a range of computing services. Current “pay-as-you-go” cloud
computing model becomes an efficient alternative to owning and managing private data centers
for customers facing Web applications and batch processing. Cloud computing frees the
enterprises and their end users from the specification of many details, such as storage resources,
computation limitation and network communication cost.
However, this bliss becomes a problem for latency-sensitive applications, which requirenodes in
the vicinity to meet their delay requirements. When techniques and devices ofIOT are getting
more involved in people’s life, current Cloud computing paradigm can hardly satisfy their
requirements of mobility support, location awareness and low latency.
Fog computing is proposed to address the above problem. As Fog computing is implemented at
the edge of the network, it provides low latency, location awareness, andimproves quality-of-
services (QOS) for streaming and real time applications. Typical examples include industrial
automation, transportation, and networks of sensors and actuators. Moreover, this new
infrastructure supports heterogeneity as Fog devices include end-user devices, access points,
edge routers and switches. The Fog paradigm is well positioned for real time big data analytics,
supports densely distributed data collection points, and provides advantages in entertainment,
advertising, personal computing and other applications.
Edge location, location awareness, and low latency:Fog computing supports endpoints
with finest services at the edge of the network.
Geographical distribution: In sharp contrast to the more centralized Cloud, the services
and applications targeted by the Fog demand widely distributed deployments. The Fog,
for instance, will play an active role in delivering high quality streaming to moving
vehicles, through proxies and access points positioned along highways and tracks.
Large-scale sensor: Networks to monitor the environment and the Smart Grid are other
examples of inherently distributed systems, requiring distributed computing and storage
resources.
Very large number of nodes: As a consequence of the wide geo-distribution, as
evidenced in sensor networks in general and the Smart Grid in particular.
Support for mobility: It is essential for many Fog applications to communicate directly
with mobile devices, and therefore support mobility techniques.
Real time interactions: Fog computing requires real time interactions for speedy service.
Thus securing the user’s true data from can be implemented by given two additional security
features:
Figure 2.2 Shows the Decoy concepts to detect unauthorized data access to data stored on a local
file system by masqueraders, i.e. attackers who view of legitimate users afterstealing their
credentials. Experimental results in a local file system setting show that combining both
techniques can yield better detection results .This results suggest that this approach may work in
a Cloud environment, to make cloud system more transparent to the user as a local file system.
Greater business agility: With the right tools, developers can quickly develop fog
applications and deploy them where needed. Fog applications program the machine to
operate in the way each customer needs.
Better security: Protect your fog nodes using the same policy, controls, and procedures
you use in other parts of your IT environment.
Deeper insights, with privacy control: Analyze sensitive data locally instead of sending it
to the cloud for analysis. IT team can monitor and control the devices that collect,
analyze, and store data.
Lower operating expense: Conserve network bandwidth by processing selected data
locally instead of sending it to the cloud for analysis.
CHAPTER 3
3.1 Advantages
Large number of nodes: Fog computing can offer densely distributed data collection
points. so it is easier and more efficient to handle this data locally.
Mobility: Fog computing can support mobile devices with densely and widely distributed
fog nodes.
Scalability/Flexibility: Fog computing supports dynamic addition or removal of devices.
Multi-tenancy: Resources available on Fog devices can be shared between multiple
applications.
3.2 Application
Smart Traffic Lights: Video camera that senses an ambulance flashing lights can
automatically change street lights to open lanes for the vehicle to pass through traffic.
Self Maintaining Train: Another application of fog computing is Self Maintaining trains.
A train ball-bearing monitoring sensor will sense the changes in the temperature level and
any disorder will automatically alert the train operator and make maintenance according
to. Thus we can avoid major disasters.
Connected cars: Fog Computing is ideal for Connected Vehicles (CV) because real-time
interactions will make communications between cars, access points and traffic lights as
safe and efficient as possible.
Conclusion
Fog computing, the new concept of the cloud at the edge of the network, is considered the
appropriate platform for many Internet of Things services. Fog computing gives the cloud a
companion to handle the extra bytes of data generated daily from the Internet
ofThings.Processing data closer to where it is produced and needed to solve the challenges of
exploding data volume, variety, and velocity.It avoids the need for costly bandwidth additions by
offloading gigabytes of network traffic from the core network. It also protects sensitive IOT data
by analyzing it inside company walls. Ultimately, organizations that adopt fog computing gain
deeper and faster insights, leading to increased business agility, higher service levels, and
improved safety. Hence, we can come to the conclusion that fog computing and cloud computing
will complement each other while having their own advantages and disadvantages. Fog
computing will grow in helping the emerging network paradigms that require faster processing
with less delay.cloud computing would serve the business community meeting their high end
computing demands lowering the cost based on a utility pricing mode. Future work includes full-
fledged fog platform implementations and performance optimizations.
References
[1] Ivan StojmenovicSIT, Deakin University, Burwood, Australia and SEECS, University
of Ottawa, Canada,”The Fog Computing Paradigm: Scenarios and Security Issues”
[2] F. Bonomi. Connected vehicles, the internet of things, and fog computing. VANET
2011, 2011.
[3] I. Stojmenovic and S. Wen, “The Fog Computing Paradigm:Scenarios and Security
Issues,” in Proceedings of FedCSIS, 2014.
[4] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of
things,” in workshop on Mobile cloud computing. ACM, 2012.
[5] J. K. Zao et al., “Pervasive brain monitoring and data sharing based on multi-tier distributed
computing and linked data technology,” Frontiers in human neuroscience, 2014.
[6] C. Dsouza, G.-J. Ahn, and M. Taguinod, “Policy-driven security management for fog
computing: Preliminary framework and a case study,” in IEEE International Conference on
Information Reuse and Integration (IRI), 2014.
[7] M. A. Hassan, M. Xiao, Q. Wei, and S. Chen, “Help your mobile applications with fog
computing,” in Fog Networking for 5G and IoT Workshop, 2015.