This document discusses fog computing, which extends cloud computing to the edge of the network. It describes the existing cloud computing model and proposes fog computing as an alternative to address issues like latency. Key topics covered include security issues, privacy issues, potential scenarios and applications of fog computing, and ideas for future enhancement.
This presentation include some of limitations of cloud computing that motivate cisco to come up with new fog computing .Fog is nothing but cloud or we can say it is an extension of the cloud.
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
This presentation include some of limitations of cloud computing that motivate cisco to come up with new fog computing .Fog is nothing but cloud or we can say it is an extension of the cloud.
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
All the details of Fog Computing is discussed in this PPT, its better to get knowledge about this ppt,All the details of applications and examples are covered..
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks,
Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network.
Cisco introduced its fog computing vision in January 2014 as a way of bringing cloud computing capabilities to the edge of the network .
As the result, closer to the rapidly growing number of connected devices and applications that consume cloud services and generate increasingly massive amounts of data.
automation in it's next level,applications of fog computing,need of fog computing,fog vs cloud, Internet of things,fog vs cloud vs IOT ,existing cloud system, proposed system presentation conclusion
The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud
Extends cloud computing services to the edge of the network.
Similar to cloud, Fog provides:
Data
Computation
Storage
Application Services to end users.
Motivations for Fog Computing:
Smart Grid, Smart Traffic Lights in vehicular networks and Software Defined Networks.
An increasing number of Consumer and Internet Internet of Things applications require some form of edge computing characterised by low latency, peer-to-peer communication, and mobility. Fog computing has recently emerged as the paradigm to address the needs of edge computing in IoT applications. Fog computing complements Cloud computing to allow the design and implementation of IoT systems that scale better, are more reactive and in which local communication and decision is enabled whenever possible.
This presentation introduces the key concepts behind Fog Computing, compare and contrast it with Cloud Computing and explain how the VORTEX platform enables Fog computing architectures.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider.
For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
CONCLUSION
This proposal of monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, this inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology could provide unprecedented levels of security in the Cloud and in social networks.
In this presentation, Naveen introduces fog computing and how it can enable the functioning of IoT devices. Naveen's interest area lies in improving network security in IoT devices.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
All the details of Fog Computing is discussed in this PPT, its better to get knowledge about this ppt,All the details of applications and examples are covered..
Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks,
Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise's network.
Cisco introduced its fog computing vision in January 2014 as a way of bringing cloud computing capabilities to the edge of the network .
As the result, closer to the rapidly growing number of connected devices and applications that consume cloud services and generate increasingly massive amounts of data.
automation in it's next level,applications of fog computing,need of fog computing,fog vs cloud, Internet of things,fog vs cloud vs IOT ,existing cloud system, proposed system presentation conclusion
The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud
Extends cloud computing services to the edge of the network.
Similar to cloud, Fog provides:
Data
Computation
Storage
Application Services to end users.
Motivations for Fog Computing:
Smart Grid, Smart Traffic Lights in vehicular networks and Software Defined Networks.
An increasing number of Consumer and Internet Internet of Things applications require some form of edge computing characterised by low latency, peer-to-peer communication, and mobility. Fog computing has recently emerged as the paradigm to address the needs of edge computing in IoT applications. Fog computing complements Cloud computing to allow the design and implementation of IoT systems that scale better, are more reactive and in which local communication and decision is enabled whenever possible.
This presentation introduces the key concepts behind Fog Computing, compare and contrast it with Cloud Computing and explain how the VORTEX platform enables Fog computing architectures.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider.
For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
CONCLUSION
This proposal of monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, this inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology could provide unprecedented levels of security in the Cloud and in social networks.
In this presentation, Naveen introduces fog computing and how it can enable the functioning of IoT devices. Naveen's interest area lies in improving network security in IoT devices.
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
Report-An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
The Internet of Things (IoT) is one of the hottest mega-trends in technology – and for good reason , IoT deals with all the components of what we consider web 3.0 including Big Data Analytics, Cloud Computing and Mobile Computing .
Azure service bus based on cloud computingarun Prabha
Azure is Microsoft’s cloud computing platform, a growing collection of integrated services—analytics, computing, database, mobile, networking, storage and web—for moving faster, achieving more and saving money. It is an infrastructure, created by Microsoft, for building, deploying and managing applications and services through a global network of Microsoft-managed and Microsoft partner hosted data centers.
Making communication across boundaries simple with Azure Service BusParticular Software
There are times when you should consider setting up secure communications between your software components across network boundaries.
Here are just a few:
* Your application is enormous (e.g., the global deployment of a marketing site targeting billions of people)
* Remoteness (e.g., your company has branch office locations around the globe)
* Your network constraints prevent communication (e.g., your machines in Azure Cloud Services are unable to talk to each other directly)
* You don't know the network conditions (e.g., IoT or mobile devices)
Yves Goeleven and Sean Feldman show how to overcome such challenges using Azure Service Bus.
In this session we will look at the Azure Service Bus and its capabilities to deliver low cost massive scale messaging. We will also look at some demo’s of how to use the service bus and some real world use cases. We will cover Service Bus Relay, Messaging and Event Hubs.
This session will be an intermediate session where we will look at the product features, common use cases and some samples.
Topic: Moving from Cloud Computing to Fog Computing: How the “Internet of Things will Change the Way We Live and Work
Speaker: Jeff Hagins, Co-founder & CTO, SmartThings
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
Abstract. Fog computing is a promising computing paradigm that ex-
tends cloud computing to the edge of networks. Similar to cloud comput-
ing but with distinct characteristics, fog computing faces new security
and privacy challenges besides those inherited from cloud computing. In
this paper, we have surveyed these challenges and corresponding solu-
tions in a brief manner.
Fog computing or fog networking, also known as fogging, is an architecture that uses edge devices to carry out a substantial amount of computation, storage, and communication locally and routed over the internet backbone.
The fast emerging of internet of things (IoTs) has introduced fog computing as an intermediate layer between end-users and the cloud datacenters. Fog computing layer characterized by its closeness to end users for service provisioning than the cloud. However, security challenges are still a big concern in fog and cloud computing paradigms as well. In fog computing, one of the most destructive attacks is man-in-the-middle (MitM). Moreover, MitM attacks are hard to be detected since they performed passively on the network level. This paper proposes a MitM mitigation scheme in fog computing architecture. The proposal mapped the fog layer on software-defined network (SDN) architecture. The proposal integrated multi-path transmission control protocol (MPTCP), moving target defense (MTD) technique, and reinforcement learning agent (RL) in one framework that contributed significantly to improving the fog layer resources utilization and security. The proposed schema hardens the network reconnaissance and discovery, thus improved the network security against MitM attack. The evaluation framework was tested using a simulation environment on mininet, with the utilization of MPTCP kernel and Ryu SDN controller. The experimental results shows that the proposed schema maintained the network resiliency, improves resource utilization without adding significant overheads compared to the traditional transmission control protocol (TCP).
Fog computing is defined as a decentralized infrastructure that places storage and processing components at the edge of the cloud, where data sources such as application users and sensors exist.It is an architecture that uses edge devices to carry out a substantial amount of computation (edge computing), storage, and communication locally and routed over the Internet backbone.To achieve real-time automation, data capture and analysis has to be done in real-time without having to deal with the high latency and low bandwidth issues that occur during the processing of network data In 2012, Cisco introduced the term fog computing for dispersed cloud infrastructures.. In 2015, Cisco partnered with Microsoft, Dell, Intel, Arm and Princeton University to form the OpenFog Consortium.The consortium's primary goals were to both promote and standardize fog computing. These concepts brought computing resources closer to data sources.Fog computing also differentiates between relevant and irrelevant data. While relevant data is sent to the cloud for storage, irrelevant data is either deleted or transmitted to the appropriate local platform. As such, edge computing and fog computing work in unison to minimize latency and maximize the efficiency associated with cloud-enabled enterprise systemsFog computing consists of various componets such as fog nodes.Fog nodes are independent devices that pick up the generated information. Fog nodes fall under three categories: fog devices, fog servers, and gateways. These devices store necessary data while fog servers also compute this data to decide the course of action. Fog devices are usually linked to fog servers. Fog gateways redirect the information between the various fog devices and servers. With Fog computing, local data storage and scrutiny of time-sensitive data become easier. With this the amount and the distance of passing data to the cloud is reduced, therefore reducing the security challenges.Fog computing enables data processing based on application demands, available networking and computing resources. This reduces the amount of data required to be transferred to the cloud, ultimately saving network bandwidth.Fog computing can run independently and ensure uninterrupted services even with fluctuating network connectivity to the cloud. It performs all time-sensitive actions close to end users which meets latency constraints of IoT applications.
IoT applications where data is generated in terabytes or more, where a quick and large amount of data processing is required and sending data to the cloud back and forth is not feasible, are good candidates for fog computing. Fog computing provides real-time processing and event responses which are critical in healthcare. Besides, it also addresses issues regarding network connectivity and traffic required for remote storage, processing and medical record retrieval from the cloud.
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
Fog Computing extends the Cloud Computing paradigm to
the edge of the network, thus enabling a new breed of applications
and services. Dening characteristics of the Fog
are: a) Low latency and location awareness; b) Wide-spread
geographical distribution; c) Mobility; d) Very large number
of nodes, e) Predominant role of wireless access, f) Strong
presence of streaming and real time applications, g) Heterogeneity.
In this paper we argue that the above characteristics
make the Fog the appropriate platform for a number
of critical Internet of Things (IoT) services and applications,
namely, Connected Vehicle, Smart Grid , Smart
Cities, and, in general, Wireless Sensors and Actuators Networks
(WSANs).
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
3. Fog Computing Is A Paradigm
That Extends Cloud Computing And Services To The Edge
Of The Network. Similar To Cloud, Fog Provides Data,
Compute, Storage, And Application Services To End-users.
The Motivation Of Fog Computing Lies In A Series Of Real
Scenarios, Such As Smart Grid, Smart Traffic Lights In
Vehicular Networks And Software Defined Networks.
ABSTRACT:
4. CISCO Recently Delivered The Vision
Of Fog Computing To Enable Applications On Billions Of
Connected
Devices To Run Directly At The Network Edge. Customers
Can
Develop, Manage And Run Software Applications On Cisco
Framework Of Networked Devices, Including Hardened
Routers
And Switches. Cisco Brings The Open Source Linux And Network
Operating System Together In A Single Networked Device.
INTRODUCTION:
6. A simple three level hierarchy as shown in above Figure.
In this framework, each smart thing is attached to one of Fog
devices. Fog devices could be interconnected and each of them
is linked to the Cloud.
7. Cloud Computing Has Provided Many Opportunities For
Enterprises By Offering Their Customers A Range Of
Computing Services. Current “Pay-as-you-go” Cloud Computing
Model Becomes An Efficient Alternative To Owning And Managing
Private Data Centers For Customers Facing Web Applications
EXISTING SYSTEM
8. Unlike Traditional Data
Centers,
Fog Devices Are Geographically
Distributed Over Heterogeneous
Platforms, Spanning Multiple
Management Domains. Cisco Is
Interested In Innovative
Proposals That Facilitate Service
Mobility Across Platforms, And
Technologies That Preserve End-
User And Content Security And
Privacy Across Domains.
PROPOSED SYSTEM
9. Fog Can Be Distinguished From Cloud By Its Proximity To End-
users.
The Dense Geographical Distribution And Its Support For
Mobility.
It Provides Low Latency, Location Awareness, And Improves
Quality-of-services (Qos) And Real Time Applications.
ADVANTAGES:
11. Existing Data Protection Mechanisms Such As Encryption Was
Failed In Securing The Data From The Attackers.
It Does Not Verify Whether The User Was Authorized Or Not.
Cloud Computing Security Does Not Focus On Ways Of Secure
The
Data From Unauthorized Access.
DISADVANTAGES:
12. The Main Security Issues Are Authentication At
Different Levels Of Gateways As Well As (In Case Of Smart Grids)
At The Smart Meters Installed In The Consumer’s Home. Each
Smart Meter And Smart Appliance Has An IP Address. A
Malicious User Can Either Tamper With Its Own Smart Meter,
Report False Readings, Or Spoof IP Addresses.
SECURITY ISSUES:
13. In This Subsection, We Take Man- In-the-
middle Attack As An Example To Expose The Security
Problems In Fog Computing. In This Attack, Gateways Serving As
Fog Devices May Be Compromised Or Replaced By Fake Ones.
EXAMPLE : MAN-IN –MIDDLE-ATTACK
14. Smart grids: Fog computing allows fast, machine-
to-machine (M2M) handshakes and human to machine
interactions (HMI), which would work in cooperation with the
cloud
PRIVACY ISSUES:
15. Fog Computing Advantages For Services
In Several Domains, Such As Smart Grid, Wireless
Sensor Networks, Internet Of Things (Iot) And
Software Defined Networks (Sdns). We Examine The
State- Of-the-art And Disclose Some General Issues
In Fog Computing Including Security, Privacy, Trust,
And Service Migration Among Fog Devices And
Between Fog And Cloud.
CONCLUSION :
16. Future Work Will Expand On The Fog Computing Paradigm In
Smart
Grid. In This Scenario, Two Models For Fog Devices Can Be
Developed. Independent Fog Devices Consult Directly With The
Cloud
For Periodic Updates On Price And Demands, While
Interconnected
Fog Devices May Consult Each Other.
Next, Fog Computing Based Sdn In Vehicular Networks Will
Receive Due Attention.
FUTURE ENCHANCEMENT:
17. [1] F. Bonomi, “Connected vehicles, the internet of things, and
fog com- puting,” in The Eighth ACM International Workshop on
Vehicular Inter- Networking (VANET), Las Vegas, USA, 2011.
[2] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog
computing and its role in the internet of things,” in Proceedings
of the First Edition of the MCC Workshop on Mobile Cloud
Computing, ser. MCC’12. ACM,2012, pp. 13–16.
REFERENCES :
Editor's Notes
What is the project about?
Define the goal of this project
Is it similar to projects in the past or is it a new effort?
Define the scope of this project
Is it an independent project or is it related to other projects?
* Note that this slide is not necessary for weekly status meetings
* If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.