SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 7, No. 6, December 2017, pp. 3669~3673
ISSN: 2088-8708, DOI: 10.11591/ijece.v7i6.pp3669-3673  3669
Journal homepage: http://iaesjournal.com/online/index.php/IJECE
Fog Computing: Issues, Challenges and Future Directions
Prakash P, Darshaun K.G, Yaazhlene. P, Medidhi Venkata Ganesh, Vasudha B
Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore,
Amrita Vishwa Vidyapeetham, Amrita University, India
Article Info ABSTRACT
Article history:
Received May 5, 2017
Revised Jun 14, 2017
Accepted Jul 2, 2017
In Cloud Computing, all the processing of the data collected by the node is
done in the central server. This involves a lot of time as data has to be
transferred from the node to central server before the processing of data can
be done in the server. Also it is not practical to stream terabytes of data from
the node to the cloud and back. To overcome these disadvantages, an
extension of cloud computing, known as fog computing, is introduced. In
this, the processing of data is done completely in the node if the data does not
require higher computing power and is done partially if the data requires high
computing power, after which the data is transferred to the central server for
the remaining computations. This greatly reduces the time involved in the
process and is more efficient as the central server is not overloaded. Fog is
quite useful in geographically dispersed areas where connectivity can be
irregular. The ideal use case requires intelligence near the edge where ultra-
low latency is critical, and is promised by fog computing. The concepts of
cloud computing and fog computing will be explored and their features will
be contrasted to understand which is more efficient and better suited for real-
time application.
Keyword:
Fog computing
Cloud computing
Edge nodes
IoT and Big Data
Copyright © 2017Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Prakash P,
Department of Computer Science and Engineering,
Amrita School of Engineering, Coimbatore,
Amrita Vishwa Vidyapeetham, Amrita University, India.
1. INTRODUCTION
Networking is shaped by two obvious trends - Cloud-based Internet and mobile computing. Cloud
computing [1, 2] forms a basic need for all organizations that deal with large amount of data. Cloud forms to
be very efficient in storing large amount of data and providing access to it from anywhere in the world. This
could lead to unauthorized access to personal data or a firm's private data [3]. In relation to cloud-computing,
bringing services to the edge of the network is fog computing. Fog computing deals with user behaviour
profiling and decoy information technology to prevent unauthorized access. In Fog Computing, computing
resources and application services are distributed in the most logical, efficient places, at any point along the
continuum from the data source to the cloud. Fog computing is defined as "a scenario where a large number
of heterogeneous wireless devices are connected together in a network, communicate and potentially
cooperate among them and with the network to perform storage and processing tasks without the intrusion of
third parties". Although this definition is debatable, this defines how fog computing differs from the related
technologies.
Fog Computing avoids primarily to store data in large-scale data centers. Fog Computing offers a
significant amount of measurement, control and configuration is performed at or near the end-user. Fog
Computing supports emerging Internet of Everything (IoE) applications that demand real-time/predictable
latency. Fog supports densely distributed data collection points, through devices called Fog nodes [4]. The
major difference between cloud computing and Fog computing is on the support of location awareness. Fog
Computing, composed of geo-distributed Fog servers, targets to deliver the localized and location based
 ISSN:2088-8708
IJECE Vol. 7, No. 6, December 2017 : 3669–3673
3670
services [5]. It is centralized or distributed in regional areas. Fog servers have localized data storage center
that avoids delay in computing
2. OVERVIEW
Fog computing is defined as a distributed computing paradigm that fundamentally extends the
services provided by the cloud to the edge of the network [6]. Cisco defines it as fog computing is considered
as an extension of the cloud computing paradigm from the core of network to the edge of the network [7]. It
facilitates the computation, storage and networking between the end devices and the traditional cloud servers.
Instead of running application only in the cloud, fog computing involves the cloud as well as the edge
devices between the end devices and cloud servers to run the application. Fog computing takes advantages of
both edge and cloud computing while it benefits from edge devices’ close proximity to the endpoints, it also
leverages the on-demand scalability of cloud resources[8]. It basically reduces the load on the cloud server by
efficiently using the resources available in the edge nodes to do partial computation and also it reduces the
traffic to the cloud server by doing filtering operations in the nodes.
There are mainly two concepts which are usually confused with fog computing. These concepts are
Mobile Edge Computing (MEC) and Mobile Cloud Computing (MCC). MCC basically suggests that both the
data storage and data processing is done outside the mobile in a cloud. So it moves the data and computing
power from the individual mobile to the cloud. MEC is similar to that of a Cloudlet. It can be seen as a cloud
computing paradigm in a more concentrated. It is like a cloud server running on an edge of a mobile network
[9]. Fog computing is a mixture of two of these concepts along with features of its own making it more
reliable and useful.
3. ISSUES
Fog computing extends cloud computing and acts on Internet of Things. These devices, called the
fog nodes can be deployed in any environment with a network connection. Fog computing has additional
storage resources at the edges to process the requirements. Hence, the Fog server needs to adapt its services
leading to management and maintenance cost. In addition, the operator needs to encounter the following
issues:
3.1. Privacy
Fog computing being dominated by wireless primarily, there is a big concern for network privacy.
Network operator generates configurations manually, fog nodes being deployed at the edge of Internet,
massive maintenance cost is involved [10]. The leakage of private data is gaining attention while using
networks. The end users are more accessible to the Fog nodes. Because of this, more sensitive information is
collected by Fog nodes than remote cloud. Encryption methods like HAN (Home-Area Network) can be used
to counter these issues.
3.2. Security
The main security issue is the authentication of the devices involved in fog computing at different
gateways. Each appliance has its own IP address. A malicious user may use a fake IP address to access
information stored on the particular fog node. To overcome this access control an intrusion detection system
has to be applied at all layers of the platform [11].
3.3. Network Management
Being connected to heterogeneous devices, managing the fog nodes, the network, connection
between each nodes will be burden unless SDN and NFV techniques are applied [12].
3.4. Placement of Fog Servers
Placing a group of fog servers in such a way that they deliver maximum service to the local
requirements is an issue. Analyzing the work done in each node in the server before placing them reduces the
maintenance cost [13].
3.5. Delay in Computing
Delays due to Data aggregation, Resource over-usage reduces the effectives of services provided by
the fog servers, causing delay in computing data. Data Aggregation should take place before data processing,
Resource-limited fog nodes should be designed scheduling by using priority and mobility model.
IJECE ISSN: 2088-8708 
Fog Computing: Issues, Challenges and Future Directions (Prakash P)
3671
3.6. Energy Consumption
Since fog environments use large number of fog nodes, the computation is distributed and can be
less energy-efficient. Hence, reduction of energy consumption in fog computing is essential [14].
4. APPLICATIONS
Fog computing have huge benefits in the real time applications. It is broadly used in IOT
applications which involves real time data. It acts as an extended version of cloud computing. It is an
intermediate between the cloud and end users (closer to end users).It can used in both the ways, that can be
between machine and machine or between the human to machine.
4.1. Mobile Big Data Analytics
In IOT (Internet of things) data is collected in bulk and it can’t be stored in cloud (Not efficient
enough). In such situations it is beneficial to use fog computing instead of cloud computing as fog nodes are
much closer to end systems.It also eliminates other problems such as delay, traffic, processing speed,
delivery time, response time, storage data transportation and data processing. Fog computing could be the
future of IOT applications.
4.2. Water Pressure at Dams
Sensors installed in dams send data to the cloud where the data is analyzed and officials are alerted
in case of any discrepancies. The problem faced here is the delay of information which could be dangerous.
To solve this, Fog is used, and since it is near the end systems it is easier to transmit data, analyze it and give
instantaneous feedback.
4.3. Smart Utility Service
Here the main aim is to conserve time, money and energy. The analysis of data needs to run every
minute to stay updated. This mostly involves the end users therefore cloud might not serve the purpose.
These applications inform users everyday as to which appliances conserve more energy. IOT also creates a
lot of traffic in the network where sending other data is difficult therefore fog is a good alternative.
4.4. Health Data
When data needs to be transferred from one hospital to another high security and data integrity is a
must. This can be provided by using Fog since the data is transferred locally. These fog nodes can be used by
the labs to update the patient’s lab records which can be accessed by the nearby hospitals easily. Hardcopies
of medical history and health issues of a patient need not be carried as these unified records can be accessed
by any doctor.
5. ARCHITECTURE
One major problem faced with cloud computing is the bandwidth, especially on wireless networks.
The problem only increases as the Internet of things continues to expand with a large number of physical
objects connected wirelessly. Fog computing solves this problem by storing data in local computers and
devices generally referred to as fog nodes. Any device with computing, storage and network connectivity can
be utilized as a fog node e.g. hand-held devices, tablets, PC’s, routers etc. These fog nodes are managed by
Fog Data Service which serves various purposes like control and security of data, data reduction, data
virtualization and edge analytics. Data could also be sent to the cloud for long term analytics.
 ISSN:2088-8708
IJECE Vol. 7, No. 6, December 2017 : 3669–3673
3672
Figure 1. Fog computing architecture
6. COMPARISON BETWEEN CLOUD COMPUTING AND FOG COMPUTING
Cloud computing is a great solution when there is an uninterrupted access to a cloud server capable
of processing and transmitting data quickly to the end device. Fog computing is mainly an architecture of
heterogeneous devices in which certain applications and services are managed at the node by a smart device
but the actual management is by the cloud. Fog computing primarily targets the mobile users while cloud
targets the general internet users. The service type is localized in fog computing whereas in cloud, it’s
globalized. Though the storage is limited in fog computing compared to cloud computing, the distance
between the users is very less that it can be communicated through wireless connections but in cloud
computing, communication is through IP networks.
Comparing the parameters of fog and cloud computing, in fog computing, Mobility is supported
whereas in cloud it's limited. The number of service nodes in fog is more than in the other. Real time
interactions are supported in the former while it's not supported in the latter. Providing local security in cloud
is tedious while it is possible in Fog computing.
Table 1. Comparisons of the Parameters of Cloud and Fog computing [15]
Parameters Cloud computing Fog computing
Server nodes Location Within the Internet At the edge of the network
Client and Server Distance Multiple hops Single/Multiple hops
Latency High Low
Delay Jitter High Very low
Security Less secure, Undefined More secure, can be defined
Awareness about Location No Yes
Vulnerability High Probability Very low probability
Geographical Distribution Centralized Dense and Distributed
Number of Server nodes Few Very Large
Real Time Interactions Supported Supported
Kind of last mile connectivity Leased line Wireless
Mobility Limited support Supported
IJECE ISSN: 2088-8708 
Fog Computing: Issues, Challenges and Future Directions (Prakash P)
3673
7. CONCLUSION
Fog Computing and its applications has been discussed .Fog computing has the ability to handle the
flooding of data created by Internet of Things on the edge of the network. The characteristics of fog
computing like mobility, proximity to end-users, low latency, location awareness, heterogeneity and due to
its real-time applications fog computing platform is considered as the appropriate platform for Internet of
Things. Fog computing is entering an exciting time, where it can positively affect operational costs. Fog
computing resolves problems related to congestion, space and internet traffic. Fog computing also provides
an intelligent platform to manage the distributed and real-time nature of emerging IoT infrastructures.
Developing these services at the edge through fog computing will lead to new business models and
opportunities for network operators.
REFERENCES
[1] Sangeetha K.S, Prakash P, "Big Data and cloud: A survey", (2015) Advances in Intelligent Systems and
Computing, 325, pp. 773-778.
[2] Shiva Jegan R.D, Vasudevan S.K, Abarna K., Prakash P, Srivathsan S., Gangothri V., "Cloud computing: A
Technical Gawk", (2014) International Journal of Applied Engineering Research, 9(14), pp. 2539-2554.
[3] Viraj G. Mandlekar, VireshKumar Mahale, Sanket S.Sancheti, Maaz S. Rais, "Survey on Fog Computing
Mitigating Data Theft Attacks in Cloud", International Journal of Innovative Research in Computer Science &
Technology, Nov - 2014.
[4] Ramin Elahi, "Fog Computing and its Ecosystem", SNIA Global Education, 2015.
[5] Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Guiyi We, and Limin Sun, "Fog Computing: Focusing on
mobile Users at the Edge", Mar 2016.
[6] Shanhe Yi, Zhengrui Qin and Qun Li, “Security and Privacy Issues of Fog Computing: A Survey”, International
Conference on Wireless Algorithms, Systems, and Applications, 2015, pp. 685-695.
[7] Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li, "Fog Computing: Platform and Applications", dept. Of
Computer Science, College of William and Mary, IEEE - 2015.
[8] Harshit Gupta, Amir Vahid Dastjerdi, Soumya K. Ghosh and Rajkumar Buyya, “iFogSim: A Toolkit for Modeling
and Simulation of Resource Management Techniques in Internet of Things, Edge and Fog Computing
Environments”, Cloud Computing and Distributed Systems Laboratory, The University of Melbourne, June 6,
2016.
[9] Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li, "Fog Computing: Platform and Applications", dept. Of
Computer Science, College of William and Mary, IEEE - 2015.
[10] Shanhe Yi, Zhengrui Qin, and Qun Li, "Security and Privacy Issues Of Fog Computing: A Survey", College of
William and Mary.
[11] Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li, "Fog Computing: Platform and Applications", dept. Of
Computer Science, College of William and Mary, IEEE - 2015.
[12] Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li, "Fog Computing: Platform and Applications", dept. Of
Computer Science, College of William and Mary, IEEE - 2015.
[13] Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Guiyi We, and Limin Sun, "Fog Computing: Focusing on
mobile Users at the Edge", Mar 2016.
[14] Amir Vahid Dastjerdi, Harshit Gupta, Rodrigo N. Calheiros, Soumya K. Ghosh, and Rajkumar Buyya, "Fog
Computing: Principles, Architectures, and Applications", IEEE -21016.
[15] Anuj Kumar, K.P Saharan, "Fog in comparison to cloud: A survey", International Journal of Computer
Applications, Jul - 2015.

More Related Content

What's hot

G033030035
G033030035G033030035
G033030035
ijceronline
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
Rezgar Mohammad
 
Fog computing
Fog computingFog computing
Fog computing
Hadi Fadlallah
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
AM Publications
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
ijtsrd
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
IJARIIT
 
Fog security
Fog securityFog security
Fog security
HarshitParkar6677
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET Journal
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET Journal
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
IJNSA Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 

What's hot (19)

FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
G033030035
G033030035G033030035
G033030035
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Fog security
Fog securityFog security
Fog security
 
70 74
70 7470 74
70 74
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
 
Fog doc
Fog doc Fog doc
Fog doc
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 

Similar to Fog Computing: Issues, Challenges and Future Directions

Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
FredReynolds2
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
Shivangi Bali
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
IRJET Journal
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
Nitin Kumar Yadav
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
Enterprise Wired
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
Prathmeshnawale2
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
SachuS16
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
IJCNCJournal
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
RemoMarconzini1
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
IRJET Journal
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
IRJET Journal
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
AliAbdelwahab6
 

Similar to Fog Computing: Issues, Challenges and Future Directions (20)

Fog comuting
Fog comutingFog comuting
Fog comuting
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
FOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computingFOG COMPUTING, what and why a fog computing
FOG COMPUTING, what and why a fog computing
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
A Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdfA Comprehensive Exploration of Fog Computing.pdf
A Comprehensive Exploration of Fog Computing.pdf
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
fog computing related to cyber securityf
fog computing related to cyber securityffog computing related to cyber securityf
fog computing related to cyber securityf
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Edge Computing.pdf
Edge Computing.pdfEdge Computing.pdf
Edge Computing.pdf
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 

More from IJECEIAES

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
IJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 

More from IJECEIAES (20)

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 

Fog Computing: Issues, Challenges and Future Directions

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 7, No. 6, December 2017, pp. 3669~3673 ISSN: 2088-8708, DOI: 10.11591/ijece.v7i6.pp3669-3673  3669 Journal homepage: http://iaesjournal.com/online/index.php/IJECE Fog Computing: Issues, Challenges and Future Directions Prakash P, Darshaun K.G, Yaazhlene. P, Medidhi Venkata Ganesh, Vasudha B Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, India Article Info ABSTRACT Article history: Received May 5, 2017 Revised Jun 14, 2017 Accepted Jul 2, 2017 In Cloud Computing, all the processing of the data collected by the node is done in the central server. This involves a lot of time as data has to be transferred from the node to central server before the processing of data can be done in the server. Also it is not practical to stream terabytes of data from the node to the cloud and back. To overcome these disadvantages, an extension of cloud computing, known as fog computing, is introduced. In this, the processing of data is done completely in the node if the data does not require higher computing power and is done partially if the data requires high computing power, after which the data is transferred to the central server for the remaining computations. This greatly reduces the time involved in the process and is more efficient as the central server is not overloaded. Fog is quite useful in geographically dispersed areas where connectivity can be irregular. The ideal use case requires intelligence near the edge where ultra- low latency is critical, and is promised by fog computing. The concepts of cloud computing and fog computing will be explored and their features will be contrasted to understand which is more efficient and better suited for real- time application. Keyword: Fog computing Cloud computing Edge nodes IoT and Big Data Copyright © 2017Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Prakash P, Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, India. 1. INTRODUCTION Networking is shaped by two obvious trends - Cloud-based Internet and mobile computing. Cloud computing [1, 2] forms a basic need for all organizations that deal with large amount of data. Cloud forms to be very efficient in storing large amount of data and providing access to it from anywhere in the world. This could lead to unauthorized access to personal data or a firm's private data [3]. In relation to cloud-computing, bringing services to the edge of the network is fog computing. Fog computing deals with user behaviour profiling and decoy information technology to prevent unauthorized access. In Fog Computing, computing resources and application services are distributed in the most logical, efficient places, at any point along the continuum from the data source to the cloud. Fog computing is defined as "a scenario where a large number of heterogeneous wireless devices are connected together in a network, communicate and potentially cooperate among them and with the network to perform storage and processing tasks without the intrusion of third parties". Although this definition is debatable, this defines how fog computing differs from the related technologies. Fog Computing avoids primarily to store data in large-scale data centers. Fog Computing offers a significant amount of measurement, control and configuration is performed at or near the end-user. Fog Computing supports emerging Internet of Everything (IoE) applications that demand real-time/predictable latency. Fog supports densely distributed data collection points, through devices called Fog nodes [4]. The major difference between cloud computing and Fog computing is on the support of location awareness. Fog Computing, composed of geo-distributed Fog servers, targets to deliver the localized and location based
  • 2.  ISSN:2088-8708 IJECE Vol. 7, No. 6, December 2017 : 3669–3673 3670 services [5]. It is centralized or distributed in regional areas. Fog servers have localized data storage center that avoids delay in computing 2. OVERVIEW Fog computing is defined as a distributed computing paradigm that fundamentally extends the services provided by the cloud to the edge of the network [6]. Cisco defines it as fog computing is considered as an extension of the cloud computing paradigm from the core of network to the edge of the network [7]. It facilitates the computation, storage and networking between the end devices and the traditional cloud servers. Instead of running application only in the cloud, fog computing involves the cloud as well as the edge devices between the end devices and cloud servers to run the application. Fog computing takes advantages of both edge and cloud computing while it benefits from edge devices’ close proximity to the endpoints, it also leverages the on-demand scalability of cloud resources[8]. It basically reduces the load on the cloud server by efficiently using the resources available in the edge nodes to do partial computation and also it reduces the traffic to the cloud server by doing filtering operations in the nodes. There are mainly two concepts which are usually confused with fog computing. These concepts are Mobile Edge Computing (MEC) and Mobile Cloud Computing (MCC). MCC basically suggests that both the data storage and data processing is done outside the mobile in a cloud. So it moves the data and computing power from the individual mobile to the cloud. MEC is similar to that of a Cloudlet. It can be seen as a cloud computing paradigm in a more concentrated. It is like a cloud server running on an edge of a mobile network [9]. Fog computing is a mixture of two of these concepts along with features of its own making it more reliable and useful. 3. ISSUES Fog computing extends cloud computing and acts on Internet of Things. These devices, called the fog nodes can be deployed in any environment with a network connection. Fog computing has additional storage resources at the edges to process the requirements. Hence, the Fog server needs to adapt its services leading to management and maintenance cost. In addition, the operator needs to encounter the following issues: 3.1. Privacy Fog computing being dominated by wireless primarily, there is a big concern for network privacy. Network operator generates configurations manually, fog nodes being deployed at the edge of Internet, massive maintenance cost is involved [10]. The leakage of private data is gaining attention while using networks. The end users are more accessible to the Fog nodes. Because of this, more sensitive information is collected by Fog nodes than remote cloud. Encryption methods like HAN (Home-Area Network) can be used to counter these issues. 3.2. Security The main security issue is the authentication of the devices involved in fog computing at different gateways. Each appliance has its own IP address. A malicious user may use a fake IP address to access information stored on the particular fog node. To overcome this access control an intrusion detection system has to be applied at all layers of the platform [11]. 3.3. Network Management Being connected to heterogeneous devices, managing the fog nodes, the network, connection between each nodes will be burden unless SDN and NFV techniques are applied [12]. 3.4. Placement of Fog Servers Placing a group of fog servers in such a way that they deliver maximum service to the local requirements is an issue. Analyzing the work done in each node in the server before placing them reduces the maintenance cost [13]. 3.5. Delay in Computing Delays due to Data aggregation, Resource over-usage reduces the effectives of services provided by the fog servers, causing delay in computing data. Data Aggregation should take place before data processing, Resource-limited fog nodes should be designed scheduling by using priority and mobility model.
  • 3. IJECE ISSN: 2088-8708  Fog Computing: Issues, Challenges and Future Directions (Prakash P) 3671 3.6. Energy Consumption Since fog environments use large number of fog nodes, the computation is distributed and can be less energy-efficient. Hence, reduction of energy consumption in fog computing is essential [14]. 4. APPLICATIONS Fog computing have huge benefits in the real time applications. It is broadly used in IOT applications which involves real time data. It acts as an extended version of cloud computing. It is an intermediate between the cloud and end users (closer to end users).It can used in both the ways, that can be between machine and machine or between the human to machine. 4.1. Mobile Big Data Analytics In IOT (Internet of things) data is collected in bulk and it can’t be stored in cloud (Not efficient enough). In such situations it is beneficial to use fog computing instead of cloud computing as fog nodes are much closer to end systems.It also eliminates other problems such as delay, traffic, processing speed, delivery time, response time, storage data transportation and data processing. Fog computing could be the future of IOT applications. 4.2. Water Pressure at Dams Sensors installed in dams send data to the cloud where the data is analyzed and officials are alerted in case of any discrepancies. The problem faced here is the delay of information which could be dangerous. To solve this, Fog is used, and since it is near the end systems it is easier to transmit data, analyze it and give instantaneous feedback. 4.3. Smart Utility Service Here the main aim is to conserve time, money and energy. The analysis of data needs to run every minute to stay updated. This mostly involves the end users therefore cloud might not serve the purpose. These applications inform users everyday as to which appliances conserve more energy. IOT also creates a lot of traffic in the network where sending other data is difficult therefore fog is a good alternative. 4.4. Health Data When data needs to be transferred from one hospital to another high security and data integrity is a must. This can be provided by using Fog since the data is transferred locally. These fog nodes can be used by the labs to update the patient’s lab records which can be accessed by the nearby hospitals easily. Hardcopies of medical history and health issues of a patient need not be carried as these unified records can be accessed by any doctor. 5. ARCHITECTURE One major problem faced with cloud computing is the bandwidth, especially on wireless networks. The problem only increases as the Internet of things continues to expand with a large number of physical objects connected wirelessly. Fog computing solves this problem by storing data in local computers and devices generally referred to as fog nodes. Any device with computing, storage and network connectivity can be utilized as a fog node e.g. hand-held devices, tablets, PC’s, routers etc. These fog nodes are managed by Fog Data Service which serves various purposes like control and security of data, data reduction, data virtualization and edge analytics. Data could also be sent to the cloud for long term analytics.
  • 4.  ISSN:2088-8708 IJECE Vol. 7, No. 6, December 2017 : 3669–3673 3672 Figure 1. Fog computing architecture 6. COMPARISON BETWEEN CLOUD COMPUTING AND FOG COMPUTING Cloud computing is a great solution when there is an uninterrupted access to a cloud server capable of processing and transmitting data quickly to the end device. Fog computing is mainly an architecture of heterogeneous devices in which certain applications and services are managed at the node by a smart device but the actual management is by the cloud. Fog computing primarily targets the mobile users while cloud targets the general internet users. The service type is localized in fog computing whereas in cloud, it’s globalized. Though the storage is limited in fog computing compared to cloud computing, the distance between the users is very less that it can be communicated through wireless connections but in cloud computing, communication is through IP networks. Comparing the parameters of fog and cloud computing, in fog computing, Mobility is supported whereas in cloud it's limited. The number of service nodes in fog is more than in the other. Real time interactions are supported in the former while it's not supported in the latter. Providing local security in cloud is tedious while it is possible in Fog computing. Table 1. Comparisons of the Parameters of Cloud and Fog computing [15] Parameters Cloud computing Fog computing Server nodes Location Within the Internet At the edge of the network Client and Server Distance Multiple hops Single/Multiple hops Latency High Low Delay Jitter High Very low Security Less secure, Undefined More secure, can be defined Awareness about Location No Yes Vulnerability High Probability Very low probability Geographical Distribution Centralized Dense and Distributed Number of Server nodes Few Very Large Real Time Interactions Supported Supported Kind of last mile connectivity Leased line Wireless Mobility Limited support Supported
  • 5. IJECE ISSN: 2088-8708  Fog Computing: Issues, Challenges and Future Directions (Prakash P) 3673 7. CONCLUSION Fog Computing and its applications has been discussed .Fog computing has the ability to handle the flooding of data created by Internet of Things on the edge of the network. The characteristics of fog computing like mobility, proximity to end-users, low latency, location awareness, heterogeneity and due to its real-time applications fog computing platform is considered as the appropriate platform for Internet of Things. Fog computing is entering an exciting time, where it can positively affect operational costs. Fog computing resolves problems related to congestion, space and internet traffic. Fog computing also provides an intelligent platform to manage the distributed and real-time nature of emerging IoT infrastructures. Developing these services at the edge through fog computing will lead to new business models and opportunities for network operators. REFERENCES [1] Sangeetha K.S, Prakash P, "Big Data and cloud: A survey", (2015) Advances in Intelligent Systems and Computing, 325, pp. 773-778. [2] Shiva Jegan R.D, Vasudevan S.K, Abarna K., Prakash P, Srivathsan S., Gangothri V., "Cloud computing: A Technical Gawk", (2014) International Journal of Applied Engineering Research, 9(14), pp. 2539-2554. [3] Viraj G. Mandlekar, VireshKumar Mahale, Sanket S.Sancheti, Maaz S. Rais, "Survey on Fog Computing Mitigating Data Theft Attacks in Cloud", International Journal of Innovative Research in Computer Science & Technology, Nov - 2014. [4] Ramin Elahi, "Fog Computing and its Ecosystem", SNIA Global Education, 2015. [5] Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Guiyi We, and Limin Sun, "Fog Computing: Focusing on mobile Users at the Edge", Mar 2016. [6] Shanhe Yi, Zhengrui Qin and Qun Li, “Security and Privacy Issues of Fog Computing: A Survey”, International Conference on Wireless Algorithms, Systems, and Applications, 2015, pp. 685-695. [7] Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li, "Fog Computing: Platform and Applications", dept. Of Computer Science, College of William and Mary, IEEE - 2015. [8] Harshit Gupta, Amir Vahid Dastjerdi, Soumya K. Ghosh and Rajkumar Buyya, “iFogSim: A Toolkit for Modeling and Simulation of Resource Management Techniques in Internet of Things, Edge and Fog Computing Environments”, Cloud Computing and Distributed Systems Laboratory, The University of Melbourne, June 6, 2016. [9] Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li, "Fog Computing: Platform and Applications", dept. Of Computer Science, College of William and Mary, IEEE - 2015. [10] Shanhe Yi, Zhengrui Qin, and Qun Li, "Security and Privacy Issues Of Fog Computing: A Survey", College of William and Mary. [11] Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li, "Fog Computing: Platform and Applications", dept. Of Computer Science, College of William and Mary, IEEE - 2015. [12] Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li, "Fog Computing: Platform and Applications", dept. Of Computer Science, College of William and Mary, IEEE - 2015. [13] Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Guiyi We, and Limin Sun, "Fog Computing: Focusing on mobile Users at the Edge", Mar 2016. [14] Amir Vahid Dastjerdi, Harshit Gupta, Rodrigo N. Calheiros, Soumya K. Ghosh, and Rajkumar Buyya, "Fog Computing: Principles, Architectures, and Applications", IEEE -21016. [15] Anuj Kumar, K.P Saharan, "Fog in comparison to cloud: A survey", International Journal of Computer Applications, Jul - 2015.