fog computing- presentation

19
FOG COMPUTING -SCENARIOS AND ITS ROLE IN CLOUD SECURITY Presented by: Anjana M. Shivangi (2GI11IS006) Ashwini A. Patil (2GI11IS012) 1 Under the Guidance of: Prof. K.S. Mathad

Upload: anjana-shivangi

Post on 23-Jan-2018

1.350 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: FOG COMPUTING- Presentation

FOG COMPUTING -SCENARIOS AND ITS ROLE IN CLOUD SECURITY

Presented by:

Anjana M. Shivangi (2GI11IS006)

Ashwini A. Patil (2GI11IS012)

1

Under the Guidance of:

Prof. K.S. Mathad

Page 2: FOG COMPUTING- Presentation

Contents

1. Introduction

2. Security Issues in Cloud

3. Why do we need Fog Computing?

4. Securing Cloud using Fog

5. Fog Computing Architecture

6. What can we do with Fog Computing?

7. Security and Privacy Issues in Fog Computing

8. Conclusion

9. References

2

Page 3: FOG COMPUTING- Presentation

Introduction

Internet of Things ( IoT)

The Internet of Things (IoTs) can be described as connecting everyday objects like smart-phones, Internet TVs, sensors and actuators to the Internet where the devices are intelligently linked together enabling new forms of communication between things and people, and between things themselves.

Now anyone, from anywhere and anytime can have connectivity for anything and it is expected that these connections will extend and create an entirely advanced dynamic network of IoTs.

3

Page 4: FOG COMPUTING- Presentation

Cloud computing (Existing system)

Cloud is basically a cluster of multiple dedicated servers attached within a network.

It has provided many opportunities for enterprises by offering their customers a range of computing services.

Current “Pay-as-you-Use” Cloud computing model becomes an efficient alternative to owning and managing private data centers for customers facing Web applications.

4

Page 5: FOG COMPUTING- Presentation

Fog computing

Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network.

Like Cloud, Fog provides data computation, storage and application services for end users.

Fog computing concept is actually a Cloud computing close to the “ground”.

5

Page 6: FOG COMPUTING- Presentation

Security issues in cloud

1. Abuse and Nefarious use of Cloud Computing

2. Insecure Application Programming Interfaces(API’s)

3. Malicious Insiders

4. Shared Technology Vulnerabilities

5. Data Loss/Leakage

6. Account, Service and Traffic Hijacking

7. Unknown Risk Profile

6

Page 7: FOG COMPUTING- Presentation

Why do we need fog computing?

Existing data protection mechanisms such as encryption, failed in securing the data from the attackers.

The most evident bottleneck seen, is because of Limited Bandwidth problem.

With the proliferation of cloud computing placing added demands on Internet speed and connectivity, latency is becoming a more critical concern for everyone, from the end user to the enterprise.

Another prominent limitations of cloud computing includes requirement of high speed reliable Internet connectivity and sometimes multi-homing to avoid link outages and high latency, but would be very expensive and complex.

7

Page 8: FOG COMPUTING- Presentation

Securing cloud using fog8

Page 9: FOG COMPUTING- Presentation

User behavior profiling

User profiling is a well-knowntechnique that can be applied hereto model how, when, and howmuch a user accesses theirinformation in the Cloud.

Simple user specific features canserve to detect abnormal Cloudaccess based partially upon thescale and scope of data transferred.

9

Page 10: FOG COMPUTING- Presentation

Decoy system

Decoy data, such as decoy documents, honey pots and other bogus information can be generated on demand and used for detecting unauthorized access to information and to poison the thief’s ex-filtrated information.

Serving decoys will confuse an attacker into believing they have ex-filtrated useful information, when they have actually not.

10

Page 11: FOG COMPUTING- Presentation

Combining the two technologies11

USER PROFILING

USER PROFILING

DECOY DOCUMEN

T

ORIGINAL DOCUMEN

T

SYSTEM

Page 12: FOG COMPUTING- Presentation

Fog computing architecture

ADMINADMIN

OPERATIONS

ANSWER TO QUESTIONS

LOGIN

USER

LOGIN

SIGN UP

ANSWER TO QUESTIONS

ENTER USERNAME

ENTER PASSWORD

VIEW MY FILES

SEND MAIL

DOWNLOAD FILES

UPLOAD FILES

ORIGINAL DOCUMENT

DECOY DOCUMENT

FOG COMPUTING

12

Page 13: FOG COMPUTING- Presentation

What can we do with fog computing?13

Smart grid

Smart Traffic Lights

Software Defined

Networks

Scenarios

Wireless Sensor

Decentralized Smart

Building Control

Internet of Things

Page 14: FOG COMPUTING- Presentation

Security and privacy issues in fog computing

i) Security Issues:

The main security issues are authentication at different levels of gateways as well as (in case of smart grids) at the smart meters installed in the consumer’s home. Each smart meter and smart appliance has an IP address. A malicious user can either tamper with its own smart meter, report false readings, or spoof IP addresses.

ii) Privacy Issues

In smart grids, privacy issues deal with hiding details, such as what appliance was used at what time, while allowing correct summary information for accurate charging.

14

Page 15: FOG COMPUTING- Presentation

Security and privacy issues in fog computing

iii) An Example: Man-in-the-Middle Attack

In this subsection, we take man-in-the-middle attack as an example to expose the security problems in Fog computing.

In this attack, gateways serving as Fog devices may be compromised or replaced by fake ones.

15

Page 16: FOG COMPUTING- Presentation

conclusion

• With the increase of data theft attacks the security of user data is becoming a serious issue for cloud service providers for which Fog Computing is a paradigm which helps in monitoring the behavior of the user and providing security to the user’s data.

• By using decoy technique in Fog can minimize insider attacks in cloud. • Fog provides unprecedented levels of security in the Cloud and in social

networks. • The usage of fog computing can accelerate the innovation process in ways

that has never been seen before. This includes self-healing, self-organizing and self-learning applications for industrial networks products.

16

Page 17: FOG COMPUTING- Presentation

References [1] Ivan Stojmenovic and Sheng Wen, “The Fog Computing Paradigm: Scenarios and Security

Issues”, 2014 IEEE Federated Conference on Computer Science and Information Systems.

[2] Salvatore J. Stolfo, Malek Ben Salem and Angelos D. Keromytis, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud”, 2014 IEEE CS Security and Privacy Workshop.

[3] Mohammad Aazam, Eui-Nam Huh, “Fog Computing and Smart Gateway Based Communication for Cloud of Things”, 2014 International Conference on Future Internet of Things and Cloud.

[4] Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online].Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

[5] http://en.wikipedia.org/wiki/Fog_computing

[6] Cisco Cloud Computing -Data Center Strategy, Architecture, and Solutions http://www.cisco.com/web/strategy/docs/gov/CiscoCloudComputing_WP.pdf.

[7] http://www.slideshare.net/priyankareddy14/fog-computing-provide-security-to-the-data-in-cloud?related=1

17

Page 18: FOG COMPUTING- Presentation

18

Page 19: FOG COMPUTING- Presentation

19