fog computing
TRANSCRIPT
FOG Computing
Presented by : MOHIT JAJU
(0832IT141030)
FOG COMPUTING
Contents• Abstract• Introduction• History• Features• Disadvantages• Cloud Vs FOG• Conclusion• Future scope
FOG COMPUTING
Abstract• Fog computing is not a replacement of cloud it is just extends the
cloud computing by providing security in the cloud environment.• Cloud computing promises to significantly change the way of use
computers and store our personal and business information can arises new data security challenges. Encryption mechanisms not protect the data in the cloud from unauthorized access.
• We proposed a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns.
FOG COMPUTING
IntroductionWHAT IS FOG Computing?
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
FOG COMPUTING
History• The term fog computing is often associated with
Cisco. "Cisco Fog Computing" is a registered name; “fog computing” is open to the community at large. The choice of the word "fog" is meant to convey the idea that the advantages of cloud computing can and should be brought closer to the data source. (In meteorology, fog is simply a cloud that is close to the ground).
• Mr. Chuck Robbins is the CEO of the Cisco.
FOG COMPUTING
Features• FOG aims to place the data close to the end user.• Big data and analytics can be done faster with better
results.• Administrators are able to support location based
mobility demands and not have to traverse the entire network.
• Enhance the cloud experience by isolating user data that needs to live on thee edge.
FOG COMPUTING
Disadvantages• No body is identified when the attack is
happen.• It is complex to detect which user is attack.• We can not detect which file was hacking.
FOG COMPUTING
FOG COMPUTING
Cloud Vs FOG
FOG COMPUTING
Conclusion• FOG computing is not a replacement of cloud.• The system was developed only with email
provision but we have also implemented the SMS technique. In Fog computing we presenting a new approach for solving the problem of insider data theft attack in a cloud using dynamically generated decoy files and also saving storage required for maintaining decoy files in the cloud. So by using decoy technique in FOG can minimize insider attacks in cloud.
• It just extends the cloud computing by providing security in the cloud environment.
FOG COMPUTING
Future Scope• FOG/Cloud computing is the future for
organizations.• Applicable only for single cloud ownership system.• FOG application can be enhanced to manage a
cloud environment which has more than one cloud architecture.
FOG COMPUTING
FOG COMPUTING
CDSC
c CDGI
FOG COMPUTING
FOG COMPUTING