SlideShare a Scribd company logo
FOG COMPUTING
CONTENTS:
Abstract.
Introduction.
Existing System.
Proposed System.
Scenarios.
Security Issues.
Example.
Privacy Issues.
Conclusion.
Future Enhancement.
References.
Fog Computing Is A Paradigm
That Extends Cloud Computing And Services To The Edge
Of The Network. Similar To Cloud, Fog Provides Data,
Compute, Storage, And Application Services To End-users.
The Motivation Of Fog Computing Lies In A Series Of Real
Scenarios, Such As Smart Grid, Smart Traffic Lights In
Vehicular Networks And Software Defined Networks.
ABSTRACT:
CISCO Recently Delivered The Vision
Of Fog Computing To Enable Applications On Billions Of
Connected
Devices To Run Directly At The Network Edge. Customers
Can
Develop, Manage And Run Software Applications On Cisco
Framework Of Networked Devices, Including Hardened
Routers
And Switches. Cisco Brings The Open Source Linux And Network
Operating System Together In A Single Networked Device.
INTRODUCTION:
Fog
Cloud
Locations
Edge
Core
A simple three level hierarchy as shown in above Figure.
In this framework, each smart thing is attached to one of Fog
devices. Fog devices could be interconnected and each of them
is linked to the Cloud.
Cloud Computing Has Provided Many Opportunities For
Enterprises By Offering Their Customers A Range Of
Computing Services. Current “Pay-as-you-go” Cloud Computing
Model Becomes An Efficient Alternative To Owning And Managing
Private Data Centers For Customers Facing Web Applications
EXISTING SYSTEM
Unlike Traditional Data
Centers,
Fog Devices Are Geographically
Distributed Over Heterogeneous
Platforms, Spanning Multiple
Management Domains. Cisco Is
Interested In Innovative
Proposals That Facilitate Service
Mobility Across Platforms, And
Technologies That Preserve End-
User And Content Security And
Privacy Across Domains.
PROPOSED SYSTEM
Fog Can Be Distinguished From Cloud By Its Proximity To End-
users.
The Dense Geographical Distribution And Its Support For
Mobility.
It Provides Low Latency, Location Awareness, And Improves
Quality-of-services (Qos) And Real Time Applications.
ADVANTAGES:
Scenarios
Smart
grid
Smart
Traffic
Lights
Wireless
Sensor
Decentral
ized
Smart
Building
Control
Internet
of Things
Software
Defined
Networks
Existing Data Protection Mechanisms Such As Encryption Was
Failed In Securing The Data From The Attackers.
It Does Not Verify Whether The User Was Authorized Or Not.
Cloud Computing Security Does Not Focus On Ways Of Secure
The
Data From Unauthorized Access.
DISADVANTAGES:
The Main Security Issues Are Authentication At
Different Levels Of Gateways As Well As (In Case Of Smart Grids)
At The Smart Meters Installed In The Consumer’s Home. Each
Smart Meter And Smart Appliance Has An IP Address. A
Malicious User Can Either Tamper With Its Own Smart Meter,
Report False Readings, Or Spoof IP Addresses.
SECURITY ISSUES:
In This Subsection, We Take Man- In-the-
middle Attack As An Example To Expose The Security
Problems In Fog Computing. In This Attack, Gateways Serving As
Fog Devices May Be Compromised Or Replaced By Fake Ones.
EXAMPLE : MAN-IN –MIDDLE-ATTACK
Smart grids: Fog computing allows fast, machine-
to-machine (M2M) handshakes and human to machine
interactions (HMI), which would work in cooperation with the
cloud
PRIVACY ISSUES:
Fog Computing Advantages For Services
In Several Domains, Such As Smart Grid, Wireless
Sensor Networks, Internet Of Things (Iot) And
Software Defined Networks (Sdns). We Examine The
State- Of-the-art And Disclose Some General Issues
In Fog Computing Including Security, Privacy, Trust,
And Service Migration Among Fog Devices And
Between Fog And Cloud.
CONCLUSION :
 Future Work Will Expand On The Fog Computing Paradigm In
Smart
Grid. In This Scenario, Two Models For Fog Devices Can Be
Developed. Independent Fog Devices Consult Directly With The
Cloud
For Periodic Updates On Price And Demands, While
Interconnected
Fog Devices May Consult Each Other.
 Next, Fog Computing Based Sdn In Vehicular Networks Will
Receive Due Attention.
FUTURE ENCHANCEMENT:
[1] F. Bonomi, “Connected vehicles, the internet of things, and
fog com- puting,” in The Eighth ACM International Workshop on
Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011.
[2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog
computing and its role in the internet of things,” in Proceedings
of the First Edition of the MCC Workshop on Mobile Cloud
Computing, ser. MCC’12. ACM,2012, pp. 13–16.
REFERENCES :
Fog computing paper presentation
Fog computing paper presentation

More Related Content

What's hot

Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
Er. Ajay Sirsat
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Mohit Jaju
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
Mahantesh Hiremath
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
Fog computing
Fog computingFog computing
Fog computing
Ankit_ap
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Fog computing
Fog computingFog computing
Fog computing
Rishabh Kumar ☁️
 
Fog ppt
Fog pptFog ppt
Fog ppt
sabafarheen
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 
Fog computing
Fog computingFog computing
Fog computing
Valarmathi Srinivasan
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Fog ppt
Fog ppt Fog ppt
Fog ppt
sheenataneja1
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
Angelo Corsaro
 
Fog computing
Fog computingFog computing
Fog computing
Abdul Qadir
 
Fog computing
Fog computingFog computing
Fog computing
Mahantesh Hiremath
 

What's hot (20)

Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog ppt
Fog ppt Fog ppt
Fog ppt
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 

Viewers also liked

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
fog computing
fog computingfog computing
fog computing
Mphasis
 
Seminar report
Seminar reportSeminar report
Seminar report
archana lisbon
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
KEERTHANA M
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
Ahmed Banafa
 
Fog Computing & Blockchain, la Killer App de l'IoT
Fog Computing & Blockchain, la Killer App de l'IoTFog Computing & Blockchain, la Killer App de l'IoT
Fog Computing & Blockchain, la Killer App de l'IoT
Arnaud GROUSSARD
 
Windows Azure Service Bus
Windows Azure Service BusWindows Azure Service Bus
Windows Azure Service Bus
Pavel Revenkov
 
Introduction to Windows Azure Service Bus Relay Service
Introduction to Windows Azure Service Bus Relay ServiceIntroduction to Windows Azure Service Bus Relay Service
Introduction to Windows Azure Service Bus Relay ServiceTamir Dresher
 
Azure service bus based on cloud computing
Azure service bus based on cloud computingAzure service bus based on cloud computing
Azure service bus based on cloud computing
arun Prabha
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
Rahul Yadav
 
Making communication across boundaries simple with Azure Service Bus
Making communication across boundaries simple with Azure Service BusMaking communication across boundaries simple with Azure Service Bus
Making communication across boundaries simple with Azure Service Bus
Particular Software
 
Azure Service Bus Overview
Azure Service Bus OverviewAzure Service Bus Overview
Azure Service Bus Overview
BizTalk360
 
OUR GOAL AND FOCUS FOR "OPEN FOG CONSORTIUM"
OUR GOAL AND FOCUS FOR "OPEN FOG CONSORTIUM"OUR GOAL AND FOCUS FOR "OPEN FOG CONSORTIUM"
OUR GOAL AND FOCUS FOR "OPEN FOG CONSORTIUM"
Naoto MATSUMOTO
 
2014 Technology_Disruption_Forum_SmartThings
2014 Technology_Disruption_Forum_SmartThings2014 Technology_Disruption_Forum_SmartThings
2014 Technology_Disruption_Forum_SmartThings
COMPUTEX TAIPEI
 

Viewers also liked (15)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
fog computing
fog computingfog computing
fog computing
 
Seminar report
Seminar reportSeminar report
Seminar report
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
 
Fog Computing & Blockchain, la Killer App de l'IoT
Fog Computing & Blockchain, la Killer App de l'IoTFog Computing & Blockchain, la Killer App de l'IoT
Fog Computing & Blockchain, la Killer App de l'IoT
 
Windows Azure Service Bus
Windows Azure Service BusWindows Azure Service Bus
Windows Azure Service Bus
 
Introduction to Windows Azure Service Bus Relay Service
Introduction to Windows Azure Service Bus Relay ServiceIntroduction to Windows Azure Service Bus Relay Service
Introduction to Windows Azure Service Bus Relay Service
 
Azure service bus based on cloud computing
Azure service bus based on cloud computingAzure service bus based on cloud computing
Azure service bus based on cloud computing
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Making communication across boundaries simple with Azure Service Bus
Making communication across boundaries simple with Azure Service BusMaking communication across boundaries simple with Azure Service Bus
Making communication across boundaries simple with Azure Service Bus
 
Azure Service Bus Overview
Azure Service Bus OverviewAzure Service Bus Overview
Azure Service Bus Overview
 
OUR GOAL AND FOCUS FOR "OPEN FOG CONSORTIUM"
OUR GOAL AND FOCUS FOR "OPEN FOG CONSORTIUM"OUR GOAL AND FOCUS FOR "OPEN FOG CONSORTIUM"
OUR GOAL AND FOCUS FOR "OPEN FOG CONSORTIUM"
 
2014 Technology_Disruption_Forum_SmartThings
2014 Technology_Disruption_Forum_SmartThings2014 Technology_Disruption_Forum_SmartThings
2014 Technology_Disruption_Forum_SmartThings
 

Similar to Fog computing paper presentation

Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
Rezgar Mohammad
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
HarshitParkar6677
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
panvalkarchaitali
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
mehedi15
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Fog security
Fog securityFog security
Fog security
HarshitParkar6677
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
IJECEIAES
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
Rezgar Mohammad
 
Fog comuting
Fog comutingFog comuting
Fog comuting
TalhaMuhammad27
 
fog computing
fog computingfog computing
fog computing
AMITTRIPATHI182
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
HarshitParkar6677
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
qhawengcongo
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
qhawengcongo
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
Bharat Tank
 

Similar to Fog computing paper presentation (20)

Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Fog computing presentration
Fog computing presentrationFog computing presentration
Fog computing presentration
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Fog security
Fog securityFog security
Fog security
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Fog comuting
Fog comutingFog comuting
Fog comuting
 
fog computing
fog computingfog computing
fog computing
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Fog computing paper presentation

  • 2. CONTENTS: Abstract. Introduction. Existing System. Proposed System. Scenarios. Security Issues. Example. Privacy Issues. Conclusion. Future Enhancement. References.
  • 3. Fog Computing Is A Paradigm That Extends Cloud Computing And Services To The Edge Of The Network. Similar To Cloud, Fog Provides Data, Compute, Storage, And Application Services To End-users. The Motivation Of Fog Computing Lies In A Series Of Real Scenarios, Such As Smart Grid, Smart Traffic Lights In Vehicular Networks And Software Defined Networks. ABSTRACT:
  • 4. CISCO Recently Delivered The Vision Of Fog Computing To Enable Applications On Billions Of Connected Devices To Run Directly At The Network Edge. Customers Can Develop, Manage And Run Software Applications On Cisco Framework Of Networked Devices, Including Hardened Routers And Switches. Cisco Brings The Open Source Linux And Network Operating System Together In A Single Networked Device. INTRODUCTION:
  • 6. A simple three level hierarchy as shown in above Figure. In this framework, each smart thing is attached to one of Fog devices. Fog devices could be interconnected and each of them is linked to the Cloud.
  • 7. Cloud Computing Has Provided Many Opportunities For Enterprises By Offering Their Customers A Range Of Computing Services. Current “Pay-as-you-go” Cloud Computing Model Becomes An Efficient Alternative To Owning And Managing Private Data Centers For Customers Facing Web Applications EXISTING SYSTEM
  • 8. Unlike Traditional Data Centers, Fog Devices Are Geographically Distributed Over Heterogeneous Platforms, Spanning Multiple Management Domains. Cisco Is Interested In Innovative Proposals That Facilitate Service Mobility Across Platforms, And Technologies That Preserve End- User And Content Security And Privacy Across Domains. PROPOSED SYSTEM
  • 9. Fog Can Be Distinguished From Cloud By Its Proximity To End- users. The Dense Geographical Distribution And Its Support For Mobility. It Provides Low Latency, Location Awareness, And Improves Quality-of-services (Qos) And Real Time Applications. ADVANTAGES:
  • 11. Existing Data Protection Mechanisms Such As Encryption Was Failed In Securing The Data From The Attackers. It Does Not Verify Whether The User Was Authorized Or Not. Cloud Computing Security Does Not Focus On Ways Of Secure The Data From Unauthorized Access. DISADVANTAGES:
  • 12. The Main Security Issues Are Authentication At Different Levels Of Gateways As Well As (In Case Of Smart Grids) At The Smart Meters Installed In The Consumer’s Home. Each Smart Meter And Smart Appliance Has An IP Address. A Malicious User Can Either Tamper With Its Own Smart Meter, Report False Readings, Or Spoof IP Addresses. SECURITY ISSUES:
  • 13. In This Subsection, We Take Man- In-the- middle Attack As An Example To Expose The Security Problems In Fog Computing. In This Attack, Gateways Serving As Fog Devices May Be Compromised Or Replaced By Fake Ones. EXAMPLE : MAN-IN –MIDDLE-ATTACK
  • 14. Smart grids: Fog computing allows fast, machine- to-machine (M2M) handshakes and human to machine interactions (HMI), which would work in cooperation with the cloud PRIVACY ISSUES:
  • 15. Fog Computing Advantages For Services In Several Domains, Such As Smart Grid, Wireless Sensor Networks, Internet Of Things (Iot) And Software Defined Networks (Sdns). We Examine The State- Of-the-art And Disclose Some General Issues In Fog Computing Including Security, Privacy, Trust, And Service Migration Among Fog Devices And Between Fog And Cloud. CONCLUSION :
  • 16.  Future Work Will Expand On The Fog Computing Paradigm In Smart Grid. In This Scenario, Two Models For Fog Devices Can Be Developed. Independent Fog Devices Consult Directly With The Cloud For Periodic Updates On Price And Demands, While Interconnected Fog Devices May Consult Each Other.  Next, Fog Computing Based Sdn In Vehicular Networks Will Receive Due Attention. FUTURE ENCHANCEMENT:
  • 17. [1] F. Bonomi, “Connected vehicles, the internet of things, and fog com- puting,” in The Eighth ACM International Workshop on Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011. [2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC’12. ACM,2012, pp. 13–16. REFERENCES :

Editor's Notes

  1. What is the project about? Define the goal of this project Is it similar to projects in the past or is it a new effort? Define the scope of this project Is it an independent project or is it related to other projects? * Note that this slide is not necessary for weekly status meetings
  2. * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.