fog computing

20
FOG COMPUTING DONE BY, H.GAAYATHRI ANAND INSTITUTE OF HIGHER TECHNOLOGY B.TECH IT-III YEAR

Upload: gaayathri-harikrishnan

Post on 23-Jan-2017

546 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Fog computing

FOG COMPUTING

DONE BY,

H.GAAYATHRIANAND INSTITUTE OF HIGHER TECHNOLOGYB.TECH IT-III YEAR

Page 2: Fog computing

CONTENTS:• WHAT IS FOG COMPUTING?• WHAT IS THE NEED FOR FOG COMPUTING?• CLOUD vs FOG• APPLICATIONS• FOG COMPUTING AND THE INTERNET of THINGS• SECURITY AND PRIVACY ISSUES • CONCLUSION

Page 3: Fog computing
Page 4: Fog computing
Page 5: Fog computing

• Transmitting and processing data requires bandwidth, The more data, the more bandwidth we need.• In cloud, Data transmission simply isn’t fast enough.•Reduces Latency & Improves QOS

WHY DO WE NEED FOG COMPUTING?

Page 6: Fog computing
Page 7: Fog computing
Page 8: Fog computing
Page 9: Fog computing

LIMITATIONS OVERCAME BY FOG:

• Fogging basically helps cloud systems by easing the burden of processing data.• Fogging provides an improved security of

encrypted data as it stays closer to the end user.•Conserving the Network Bandwidth by reducing the amount of data that is analysed and stored in a cloud.

Page 10: Fog computing
Page 11: Fog computing
Page 12: Fog computing

FOG COMPUTING KEEPS THE DATA RIGHT WHERE THE INTERNET OF THINGS NEEDS IT

Page 13: Fog computing

FOG COMPUTING FOR IoT

• The concept of “fog computing” has been introduced as a bridge between IoT devices in the field and remote data centers.• IoT devices can produce huge data sets that need to be

processed. With fog computing, some of that processing load can be handled by computing resources at the edge, by filtering and summarizing the data to reduce volume and increase value and relevance.• This shift from cloud to fog makes complete sense.• In doing so,it eliminates the bandwidth bottleneck and

cripples the iot in the long run.

Page 14: Fog computing

SECURITY AND PRIVACY ISSUES

Man-in-the-middle Attack

In fog computing, there is the potential of a typical man-inthe-middle. In this attack, gateways serving as fog devices may be compromised or replaced by fake ones. In some scenarios, it is difficult to protect communication between fog node and IoT devices using encryption method. Encryption and decryption methods consume large amount of battery on mobile device.

Page 15: Fog computing

Malicious Detection Technique in Fog Computing EnvironmentsWhen some fog nodes are compromised, hybrid detection technique is useful to detect malicious code in fog nodes. It is combined with signature-based detection technique [4] and behavior-based detection technique [5]. However, IoT devices have low computing power. The behavior-based detection technique costs largely overhead. While signature-based detection technique is more efficient than it. However, it is difficult to detect various forms of the malicious code in fog nodes.

Malicious Fog Node Problem

In order to provide service to user, fog nodes process data received from the IoT devices. If the workloads is heavy, it is divided into several jobs and processed by several fog nodes. If some fog nodes are compounded by a malicious user, it is difficult to ensure the integrity of the data.

Data Protection

Messages generated from IoT devices is sent to the nearest fog nodes. It is difficult to process a volume of data on IoT devices. The data is divided into some parts and sent to several fog nodes to process it. At this point, the contents of the data should be analyzed without exposing it. When distributed and processed data is merged, the integrity of the data should be guaranteed. Because of limited resources, it is difficult to encrypt or decrypt data on IoT device.

Page 16: Fog computing

SOLUTIONS

MAN-IN-THE-MIDDLE Attack• Traditional anomaly detection methods can expose man-in-the-middle attack Malicious Detection Technique in Fog Computing Environments• In order to complement this problem, some computation of behavior-based detection techniques

that is running on the cloud is distributed into fog nodes.• Suspected malware files on a fog node are sent to cloud.• If the file is new malware, a result of analysis is stored in the signature database. • The result is transmitted to the fog node and updated signature information. Malicious Fog Node Problem• Before the computation begin, fog nodes must be trusted each other.• An authentication protocol is required. • Fog nodes should trust cloud, because there is no a fog node that manages other fog node. • In order to process a volume of data, fog nodes which is authenticated by the cloud should be only

located in fog environment.Data Protection• light-weight encryption algorithms or masking techniques are required.

Page 17: Fog computing

CONCLUSION• Fog computing is more resilient, rugged and secure • However the high end business computing would require

large amounts of resources while not being very delay sensitive. These kinds of jobs can be handled using traditional cloud computing systems successfully more than fog nodes. • Hence fog computing will never be able to replace cloud

computing and become the sole cloud computing model of the future. • Thus, it is safe to state that cloud and fog would exist side by side serving two different communities and complement each other where necessary.

Page 18: Fog computing
Page 19: Fog computing

THANK YOU

Page 20: Fog computing