Fog computing is defined as a decentralized infrastructure that places storage and processing components at the edge of the cloud, where data sources such as application users and sensors exist.It is an architecture that uses edge devices to carry out a substantial amount of computation (edge computing), storage, and communication locally and routed over the Internet backbone.To achieve real-time automation, data capture and analysis has to be done in real-time without having to deal with the high latency and low bandwidth issues that occur during the processing of network data In 2012, Cisco introduced the term fog computing for dispersed cloud infrastructures.. In 2015, Cisco partnered with Microsoft, Dell, Intel, Arm and Princeton University to form the OpenFog Consortium.The consortium's primary goals were to both promote and standardize fog computing. These concepts brought computing resources closer to data sources.Fog computing also differentiates between relevant and irrelevant data. While relevant data is sent to the cloud for storage, irrelevant data is either deleted or transmitted to the appropriate local platform. As such, edge computing and fog computing work in unison to minimize latency and maximize the efficiency associated with cloud-enabled enterprise systemsFog computing consists of various componets such as fog nodes.Fog nodes are independent devices that pick up the generated information. Fog nodes fall under three categories: fog devices, fog servers, and gateways. These devices store necessary data while fog servers also compute this data to decide the course of action. Fog devices are usually linked to fog servers. Fog gateways redirect the information between the various fog devices and servers. With Fog computing, local data storage and scrutiny of time-sensitive data become easier. With this the amount and the distance of passing data to the cloud is reduced, therefore reducing the security challenges.Fog computing enables data processing based on application demands, available networking and computing resources. This reduces the amount of data required to be transferred to the cloud, ultimately saving network bandwidth.Fog computing can run independently and ensure uninterrupted services even with fluctuating network connectivity to the cloud. It performs all time-sensitive actions close to end users which meets latency constraints of IoT applications.
IoT applications where data is generated in terabytes or more, where a quick and large amount of data processing is required and sending data to the cloud back and forth is not feasible, are good candidates for fog computing. Fog computing provides real-time processing and event responses which are critical in healthcare. Besides, it also addresses issues regarding network connectivity and traffic required for remote storage, processing and medical record retrieval from the cloud.
2. WHAT IS FOG
COMPUTING?
Fog computing is defined as a
decentralized infrastructure that places
storage and processing components at
the edge of the cloud, where data
sources such as application users and
sensors exist.
It is an architecture that uses edge
devices to carry out a substantial
amount of computation (edge
computing), storage, and
communication locally and routed over
the Internet backbone.
3. To achieve real-time automation, data capture and
analysis has to be done in real-time without having to
deal with the high latency and low bandwidth issues
that occur during the processing of network data In
2012, Cisco introduced the term fog computing for
dispersed cloud infrastructures.. In 2015, Cisco partnered
with Microsoft, Dell, Intel, Arm and Princeton University
to form the OpenFog Consortium.
OVERVIEW OF FOG COMPUTING
Other organizations, including General Electric (GE),
Foxconn and Hitachi, also contributed to this consortium.
The consortium's primary goals were to both promote
and standardize fog computing. These concepts brought
computing resources closer to data sources and allowed
these assets to access actionable intelligence using the
data they produced without having to communicate with
distant computing infrastructure.
4. CLOUD COMPUTING (EXISTING SYSTEM)
Cloud is a cluster of multiple dedicated
servers attached within a network. It
provides many computing services to
their customers. Currently “pay-as-you-
use “ cloud computing became an
efficient alternative to owing and
managing private data centers for
customers using web applications.
Like Cloud, Fog Provides Data
Computation , Storage And Application
Services For End users. Fog Computing
Concept Is Actually A Cloud Computing
Close To Ground.
5. WHY DO WE NEED FOG COMPUTING?
With the proliferation of cloud computing
placing added demands on internet speed and
connectivity. Latency is becoming a more critical
concern for everyone, from the end user to the
enterprise.
Another prominent limitation of cloud
computing includes requirement of high speed
reliable internet connectivity and sometimes
multi-homing to avoid link outages and high
latency, but would be very expensive and
complex . the way the IOT is growing, it needs
a special infrastructure base that can handle
all its requirements. At present, fog computing
is on a surge and it seems to be the most
feasible option available
8. END DEVICES FOG NODES
MONITORING
SERVICES
DATA
PROCESSORS
RESOURCE
MANAGER
SECURITY
TOOLS
APPLICATIONS BASIC COMPONENTS
OF FOG COMPUTING
9. The devices that people are most
familiar with are known as end
devices . It is the source or
destination device in a network
system . For example computers,
mobile phones, routers, cameras,
smart watches, or sensors are
data generators and can cover a
large spectrum of technology.
END DEVICES
10. FOG NODES
Fog nodes are independent devices that
pick up the generated information. Fog
nodes fall under three categories: fog
devices, fog servers, and gateways. These
devices store necessary data while fog
servers also compute this data to decide
the course of action. Fog devices are
usually linked to fog servers. Fog
gateways redirect the information
between the various fog devices and
servers.
11. MONITORING SERVICES
Monitoring services usually
include application
programming interfaces (APIs)
that keep track of the system’s
performance and resource
availability. Monitoring systems
ensure that all end devices and
fog nodes are up and
communication isn’t stalled.
12. DATA PROCESSORS
Data processors are programs that run
on fog nodes. They filter, trim, Encript
and sometimes even reconstruct faulty
data that flows from end devices. Data
processors are in charge of deciding
what to do with the data — whether it
should be stored locally on a fog server
or sent for long-term storage in the
cloud. Some processors are intelligent
enough to fill the information based
on historical data if one or more
sensors fail. This prevents any kind of
application failure.
13. RECOURCE MANAGER
Fog computing consists of
independent nodes that must work
in a synchronized manner. The
resource manager allocates and
deallocates resources to various
nodes and schedules data transfer
between nodes and the cloud. It also
takes care of data backup, ensuring
zero data loss. The resource
manager works with the monitor to
determine when and where the
demand is high. This ensures that
there is no redundancy of data as
well as fog servers.
14. SECURITY TOOLS
Since fog components directly
interact with raw data sources,
security must be built into the
system even at the ground
level. Encryption is must since all
communication tends to happen
over wireless networks. End users
directly ask the fog nodes for data
in some cases. As such, user and
access management is part of the
security efforts in fog computing.
15. APPLICATIONS
The applications can store confidential
data in various networks and monitor
this data rather than keeping a
physical copy. Applications provide
actual services to end-users. They use
the data provided by the fog
computing system to provide quality
service while ensuring cost-
effectiveness.
16. FOG COMPUTING AND EDGE COMPUTING
Edge computing and fog computing can both be defined as
technological platforms that bring computing processes
closer to where data is generated and collected from. Edge
computing can lead to large volumes of data being
transferred directly to the cloud. This can affect system
capacity, efficiency, and security. Fog computing addresses
this problem by inserting a processing layer between the
edge and the cloud. This way, the ‘fog computer’ receives the
data gathered at the edge and processes it before it reaches
the cloud.
Edge computing is defined as the practice of processing
and computing client data closer to the data source rather
than on a centralized server or a cloud-based location.
17. Fog computing also differentiates
between relevant and irrelevant data.
While relevant data is sent to
the cloud for storage, irrelevant data
is either deleted or transmitted to the
appropriate local platform. As such,
edge computing and fog computing
work in unison to minimize latency
and maximize the efficiency
associated with cloud-enabled
enterprise systems.
18. FOG COMPUTING CAN SOLVE THE IOT
CHALLENGES
02 03
NETWORK
BANDWIDTH
CONSTRAINTS
UNINTERUPTED
SERVICES
01
IOT SECURITY
CHALLENGES
04
IOT
APPLICATIONS
19. With Fog computing, local data
storage and scrutiny of time-
sensitive data become easier.
With this the amount and the
distance of passing data to the
cloud is reduced, therefore
reducing the security
challenges..
Fog computing enables data
processing based on application
demands, available networking and
computing resources. This reduces the
amount of data required to be
transferred to the cloud, ultimately
saving network bandwidth.
Fog computing can run independently
and ensure uninterrupted services
even with fluctuating network
connectivity to the cloud. It performs
all time-sensitive actions close to end
users which meets latency constraints
of IoT applications.
NETWORK BANDWIDTH
CONSTRAINTS
UNINTRUPTED SERVICES
IOT SECURITY CHALLENGES
20. IoT applications where data is generated in
terabytes or more, where a quick and large
amount of data processing is required and
sending data to the cloud back and forth is
not feasible, are good candidates for fog
computing. There are several IoT
applications where fog computing can play
a vital role. Some of them are:
2) HELATHCARE ACTIVITY TRACKING
1) SMART HOMES
IoT APPLICATIONS:
21. The smart home consists of various
devices and sensors connected.
However, these devices have
different platforms making it
difficult to integrate. Fog
computing provides a unified
interface to integrate all different
independent devices and empowers
smart home applications with
flexible resources to enable
storage, real-time processing and
low latency.
Fog computing provides real-time
processing and event responses
which are critical in healthcare.
Besides, it also addresses issues
regarding network connectivity and
traffic required for remote storage,
processing and medical record
retrieval from the cloud.
01 02
SMART HOMES HEALTHCARE ACTIVITY
TRACKING
22. 22
Its physical location takes
away any where, any time
data service of the cloud
Privacy Issues
Availability and cost of fog
equipment
Trust and Authentication
concerns
Security Issues: IP
Address Spoofing ,Man
in the middle attacks
Reduces the amount of
data sent to cloud.
Improves systems
response time
Supports Mobility
Minimizes Network and
Internet latency
Conserves Network
Bandwidth
Pros Cons
23. SECURITY ISSUES IN FOG COMPUTING:
Fog computing security issues
arise as there are many devices
connected to fog nodes and at
different gateways. Each device
has a different IP address, and
any hacker can fake your IP
address to gain access to your
personal information that is
stored in that particular fog node.
The main security concerns are
data protection, privacy issues,
Intrusion Detection etc.
24. MAN-IN-THE-MIDDLE ATTACK
We can take man in the middle
attack as an example to expose
security issues in fog computing. In
this attack, gateways serving as fog
nodes may be compromised or
replaced by fake ones. The goal of an
attack is to steal personal
information, such as login
credentials, account details and credit
card numbers