FOG Computing
Presented by :
MOHIT JAJU
(0832IT141030)
FOG COMPUTING
Contents
• Abstract
• Introduction
• History
• Features
• Disadvantages
• Cloud Vs FOG
• Conclusion
• Future scope
FOG COMPUTING
Abstract
• Fog computing is not a replacement of cloud it is just extends the cloud
computing by providing security in the cloud environment.
• Cloud computing promises to significantly change the way of use computers and
store our personal and business information can arises new data security
challenges. Encryption mechanisms not protect the data in the cloud from
unauthorized access.
• We proposed a different approach for securing data in the cloud using offensive
decoy technology. We monitor data access in the cloud and detect abnormal data
access patterns.
FOG COMPUTING
Introduction
WHAT IS FOG Computing?
Fog computing, also known as fogging/edge computing, it is a
model in which data, processing and applications are
concentrated in devices at the network edge rather than existing
almost entirely in the cloud.
FOG COMPUTING
History
• The term fog computing is often associated with Cisco.
"Cisco Fog Computing" is a registered name; “fog
computing” is open to the community at large. The
choice of the word "fog" is meant to convey the idea
that the advantages of cloud computing can and should
be brought closer to the data source. (In meteorology,
fog is simply a cloud that is close to the ground).
• Mr. Chuck Robbins is the CEO of the Cisco.
FOG COMPUTING
Features
• FOG aims to place the data close to the end user.
• Big data and analytics can be done faster with better results.
• Administrators are able to support location based mobility demands
and not have to traverse the entire network.
• Enhance the cloud experience by isolating user data that needs to live
on thee edge.
FOG COMPUTING
Disadvantages
• No body is identified when the attack is
happen.
• It is complex to detect which user is attack.
• We can not detect which file was hacking.
FOG COMPUTING
Cloud Vs FOG
FOG COMPUTING
FOG COMPUTING
Conclusion
• FOG computing is not a replacement of cloud.
• The system was developed only with email provision but we have also
implemented the SMS technique. In Fog computing we presenting a new
approach for solving the problem of insider data theft attack in a cloud using
dynamically generated decoy files and also saving storage required for
maintaining decoy files in the cloud. So by using decoy technique in FOG can
minimize insider attacks in cloud.
• It just extends the cloud computing by providing security in the cloud
environment. FOG COMPUTING
Future Scope
• FOG/Cloud computing is the future for
organizations.
• Applicable only for single cloud ownership system.
• FOG application can be enhanced to manage a cloud
environment which has more than one cloud
architecture.
FOG COMPUTING
FOG COMPUTING
CDSC
c
CDGI
FOG COMPUTING
FOG COMPUTING

Fog Computing

  • 1.
    FOG Computing Presented by: MOHIT JAJU (0832IT141030) FOG COMPUTING
  • 2.
    Contents • Abstract • Introduction •History • Features • Disadvantages • Cloud Vs FOG • Conclusion • Future scope FOG COMPUTING
  • 3.
    Abstract • Fog computingis not a replacement of cloud it is just extends the cloud computing by providing security in the cloud environment. • Cloud computing promises to significantly change the way of use computers and store our personal and business information can arises new data security challenges. Encryption mechanisms not protect the data in the cloud from unauthorized access. • We proposed a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. FOG COMPUTING
  • 4.
    Introduction WHAT IS FOGComputing? Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud. FOG COMPUTING
  • 5.
    History • The termfog computing is often associated with Cisco. "Cisco Fog Computing" is a registered name; “fog computing” is open to the community at large. The choice of the word "fog" is meant to convey the idea that the advantages of cloud computing can and should be brought closer to the data source. (In meteorology, fog is simply a cloud that is close to the ground). • Mr. Chuck Robbins is the CEO of the Cisco. FOG COMPUTING
  • 6.
    Features • FOG aimsto place the data close to the end user. • Big data and analytics can be done faster with better results. • Administrators are able to support location based mobility demands and not have to traverse the entire network. • Enhance the cloud experience by isolating user data that needs to live on thee edge. FOG COMPUTING
  • 7.
    Disadvantages • No bodyis identified when the attack is happen. • It is complex to detect which user is attack. • We can not detect which file was hacking. FOG COMPUTING
  • 8.
  • 9.
  • 10.
    Conclusion • FOG computingis not a replacement of cloud. • The system was developed only with email provision but we have also implemented the SMS technique. In Fog computing we presenting a new approach for solving the problem of insider data theft attack in a cloud using dynamically generated decoy files and also saving storage required for maintaining decoy files in the cloud. So by using decoy technique in FOG can minimize insider attacks in cloud. • It just extends the cloud computing by providing security in the cloud environment. FOG COMPUTING
  • 11.
    Future Scope • FOG/Cloudcomputing is the future for organizations. • Applicable only for single cloud ownership system. • FOG application can be enhanced to manage a cloud environment which has more than one cloud architecture. FOG COMPUTING
  • 12.
  • 13.
  • 14.