fog computing

14
FOG Computing Presented by : MOHIT JAJU (0832IT141030) FOG COMPUTING

Upload: mohit143jaju

Post on 23-Jan-2017

372 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Fog Computing

FOG Computing

Presented by : MOHIT JAJU

(0832IT141030)

FOG COMPUTING

Page 2: Fog Computing

Contents• Abstract• Introduction• History• Features• Disadvantages• Cloud Vs FOG• Conclusion• Future scope

FOG COMPUTING

Page 3: Fog Computing

Abstract• Fog computing is not a replacement of cloud it is just extends the

cloud computing by providing security in the cloud environment.• Cloud computing promises to significantly change the way of use

computers and store our personal and business information can arises new data security challenges. Encryption mechanisms not protect the data in the cloud from unauthorized access.

• We proposed a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns.

FOG COMPUTING

Page 4: Fog Computing

IntroductionWHAT IS FOG Computing?

Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.

FOG COMPUTING

Page 5: Fog Computing

History• The term fog computing is often associated with

Cisco. "Cisco Fog Computing" is a registered name; “fog computing” is open to the community at large. The choice of the word "fog" is meant to convey the idea that the advantages of cloud computing can and should be brought closer to the data source. (In meteorology, fog is simply a cloud that is close to the ground).

• Mr. Chuck Robbins is the CEO of the Cisco.

FOG COMPUTING

Page 6: Fog Computing

Features• FOG aims to place the data close to the end user.• Big data and analytics can be done faster with better

results.• Administrators are able to support location based

mobility demands and not have to traverse the entire network.

• Enhance the cloud experience by isolating user data that needs to live on thee edge.

FOG COMPUTING

Page 7: Fog Computing

Disadvantages• No body is identified when the attack is

happen.• It is complex to detect which user is attack.• We can not detect which file was hacking.

FOG COMPUTING

Page 8: Fog Computing

FOG COMPUTING

Cloud Vs FOG

Page 9: Fog Computing

FOG COMPUTING

Page 10: Fog Computing

Conclusion• FOG computing is not a replacement of cloud.• The system was developed only with email

provision but we have also implemented the SMS technique. In Fog computing we presenting a new approach for solving the problem of insider data theft attack in a cloud using dynamically generated decoy files and also saving storage required for maintaining decoy files in the cloud. So by using decoy technique in FOG can minimize insider attacks in cloud.

• It just extends the cloud computing by providing security in the cloud environment.

FOG COMPUTING

Page 11: Fog Computing

Future Scope• FOG/Cloud computing is the future for

organizations.• Applicable only for single cloud ownership system.• FOG application can be enhanced to manage a

cloud environment which has more than one cloud architecture.

FOG COMPUTING

Page 12: Fog Computing

FOG COMPUTING

Page 13: Fog Computing

CDSC

c CDGI

FOG COMPUTING

Page 14: Fog Computing

FOG COMPUTING