Professional Documents
Culture Documents
MCA20402 SEMINAR
Report On
Fog Computing
Submitted in partial fulfillment of requirement for the degree of
Submitted By
Vaishnavi P. Metre
2022-2023
1
Fog Computing VAISHNAVI METRE
CERTIFICATE
Vaishnavi Metre
in partial fulfillment of the requirement for the degree of
Guide HOD
Badnera.
2022-2023
2
Fog Computing VAISHNAVI METRE
ACKNOWLEDGEMENT
I feel deeply grateful to Prof. D. S. Deshmukh, my seminar Guide for his/her keen interest ,
positive guidance & suggestions during the preparation of this seminar. I also thank to Prof. R. R.
Sherekar , Head of P.G.Department of computer applications for helping & providing me all
the facilities during this seminar work.
I would also like to thank all faculty members & all friends for their support &
encouragement.
This is to acknowledge and express my thanks to all those who have directly or indirectly
helped me to complete my seminar successfully.
Vaishnavi P. Metre
3
Fog Computing VAISHNAVI METRE
Index
1. Abstract 5
2. Introdution 6
3. Litrature Review 7
4. Architecture 9
13. Conclusion 16
14. References 17
4
Fog Computing VAISHNAVI METRE
ABSTRACT:-
"Fog computing" means localizing at the edge of the network, some functions
and resources that techiques have developed over the years as cloud computing.
Simply it is removing cloud from network core to network edge. To understand Fog
computing let us try to understand cloud computing briefly.
To deal with such cases and malicious intruders there are some techniques which are
used to secure user data. A new technology called <Fog computing= is gaining
attention of the cloud users nowadays. Secondly, the pay-as-you-go" Cloud
computing model is an efficient alternative to owning and managing private data
centers (DCs) for customers facing Web applications and batch processing. It,
frees the enterprise and the end user from the specification of many details.
Analysts say that the future of much enterprise computing remains in the cloud, but
the real transformative computing of the future is going to happen right here, in
the objects that surround us4in the fog.
Fog Computing is not cannibalizing the cloud, rather it enables a new breed of
applications and services, there is a fruitful relationship between the Cloud and
the Fog, particularly when it comes to data management and analytics.
5
Fog Computing VAISHNAVI METRE
INTRODUCTION :-
Fog computing is the next generation computing which extends the cloud computing to the edge of the
network. It is also known as edge computing. It has been developed to address the issues faced by cloud
computing.
As we know volume of data generation is exploding due to huge amount of data generation daily by IoT
devices, Sensors, wide amount of internet usage and so on. It is estimated that about 50 billion devices will
be online by 2020. The current cloud model is not capable to handle this huge amount of data generated by
private companies, factories, airplanes, healthcare devices etc. Moreover data generated by IoT devices are
sent to clouds for analysis and storage. After the analysis, the data are sent back to the devices or are used
to perform certain action. This increases data bandwidth in the internet highway. Moreover certain time
sensitive data can not be handled by cloud network due to its higher latency.
The figure-1 depicts three layers viz. device, fog layer and cloud. As shown fog is intermediate layer
between cloud and devices which generate the data as shown. Fog computing extends the cloud to be
closer to the things which generate data. This minimizes latency requirement as fog nodes directly act on
the data. It processes and analyzes the data generated by IoT devices. Following are the major functions of
• Analyzes most time sensitive data at the edge of the network, where they are generated by devices. This
• Fog computing sends only selected data to the cloud for analysis and long term storage
6
Fog Computing VAISHNAVI METRE
LITRATURE REVIEW:-
Several works related to our work, which presents the concepts of fog computing are explained below:
7
Fog Computing VAISHNAVI METRE
HISTORY :-
The term fog computing was coined by Cisco in January 2014. This was because fog is referred to as
clouds that are close to the ground in the same way fog computing was related to the nodes which are
present near the nodes somewhere in between the host and the cloud. It was intended to bring the
computational capabilities of the system close to the host machine. After this gained a little popularity,
IBM, in 2015, coined a similar term called “Edge Computing”.
8
Fog Computing VAISHNAVI METRE
ARCHITECTURE :-
The Fog computing architecture consists of physical and logical elements in the form of hardware and
software to implement IoT (Internet of Things) network. As shown in figure-2, it is composed of IoT
devices, fog nodes, fog aggregation nodes with the help of fog data services, remote cloud storage and
local data storage server/cloud. Let us understand fog computing architecture components
• IoT devices: These are devices connected on IoT network using various wired and wireless technologies.
These devices produce data regularly in huge amount. There are numerous wireless technologies used in
IoT which include Zigbee, Zwave, RFID, 6LoWPAN, HART, NFC, Bluetooth, BLE, NFC, ISA-100.11A
etc. IoT protocols used include IPv4, IPv6, MQTT, CoAP, XMPP, AMQP etc.
• Fog Nodes: Any device with computing, storage and network connectivity is known as fog node.
Multiple fog nodes are spread across larger region to provide support to end devices. Fog nodes are
connected using different topologies. The fog nodes are installed at various locations as per different
applications such as on floor of a factory, on top of power pole, along side of railway track, in vehicles,
on oil rig and so on. Examples of fog nodes are switches, embedded servers, controllers, routers, cameras
etc. High sensitive data are processed at these fog nodes.
• Fog aggregate nodes: Each fog nodes have their aggregate fog node. It analyzes data in seconds to
minutes. IoT data storage at these nodes can be of duration in hours or days. Its geographical coverage is
wider. Fog data services are implemented to implement such aggregate node points. They are used to
address average sensitive data
9
Fog Computing VAISHNAVI METRE
As we know there are three types of data viz. most time sensitive data, less time sensitive data and time-
insensitive data. Fog computing architecture works based on type of data it receives. Nearest fog nodes
takes data input from the devices. Let us understand working of fog computing architecture.
➨Most time sensitive data are handled by nearest fog node to end device which has generated the data.
After the received data is analyzed, decision or action is transmitted to the device. After this, fog node
sends and stores summary to the cloud for future analysis. The data at fog node is analyzed in fraction of
a second.
➨Less time sensitive data are sent to aggregate node for analysis. After analysis is performed, aggregate
node sends decision or action to the device through nearest node. Aggregate fog node takes seconds or
minutes to complete the analysis. The aggregate node later sends the report to cloud for future analysis
purpose.
➨The time insensitive data can wait for longer duration (in hours, days or weeks). The data is sent to
cloud for storage and future analysis.
Fog reduces service latency, and improves QoS (Quality of Service), resulting in superior user-
experience. Fog Computing supports emerging Internet of Everything (IoE) applications that demand real-
time/predictable latency (industrial automation, transportation, networks of sensors and actuators). Fog
paradigm is well positioned for real time Big Data and real time analytics, it supports densely distributed
data collection points, hence adding a fourth axis to the often mentioned Big Data dimensions (volume,
variety, and velocity).
Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous
platforms, spanning multiple management domains. That means data can be processed locally in smart
devices rather than being sent to the cloud for processing
1
Fog Computing VAISHNAVI METRE
In the past few years, Cloud computing has provided many opportunities for
enterprises by offering their customers a range of computing services. Current “pay-as-
you- go” Cloud computing model becomes an efficient alternative to owning and
managing private data centers for customers facing Web applications and batch processing
Cloud computing frees the enterprises and their end users from the specification of many
details, such as storage resources, computation limitation and network communication
cost.
However, this bliss becomes a problem for latency-sensitive applications, which
require nodes in the vicinity to meet their delay requirements. When techniques and
devices of IoT are getting more involved in people’s life, current Cloud computing
paradigm can hardly satisfy their requirements of mobility support, location awareness and
low latency.
Fog computing is proposed to address the above problem. As Fog computing is
implemented at the edge of the network, it provides low latency, location awareness, and
improves quality-of-services (QoS) for streaming and real time applications. Typical
examples include industrial automation, transportation, and networks of sensors and
actuators. Moreover, this new infrastructure supports heterogeneity as Fog devices include
end-user devices, access points, edge routers and switches. The Fog paradigm is well
positioned for real time big data analytics, supports densely distributed data collection
points, and provides advantages in entertainment, advertising, personal computing and
other applications.
We elaborate on the role of Fog computing in the following motivating scenarios. The
advantages of Fog computing satisfy the requirements of applications in these scenarios.
1
Fog Computing VAISHNAVI METRE
There are various ways to use cloud services to save or store files,
documents and media in remote services that can be accessed whenever user connect to the
Internet. The main problem in cloud is to maintain security for user’s data in way that
guarantees only authenticated users and no one else gain access to that data. The issue of
providing security to confidential information is core security problem, that it does not
provide level of assurance most people desire. There are various methods to secure remote
data in cloud using standard access control and encryption methods.
It is good to say that all the standard approaches used for providing
security have been demonstrated to fail from time to time for a variety of reasons,
including faulty implementations, buggy code, insider attacks, misconfigured services, and
the creative construction of effective and sophisticated attacks not envisioned by the
implementers of security procedures. Building a secure and trustworthy cloud computing
environment is not enough, because attacks on data continue to happen, and when they do,
and information gets lost, there is no way to get it back. There is a need to get solutions to
such accidents.
The basic idea is that we can limit the damage of stolen data if we decrease the
value of that stolen data to the attacker. We can achieve this through a „preventive‟ decoy
(disinformation) attack. We can secure Cloud services by implementing given additional
security features.
1
Fog Computing VAISHNAVI METRE
DECOY SYSTEM:
Decoy data, such as decoy documents, honey pots and other bogus
information can be generated on demand and used for detecting unauthorized access to
information and to poison the thief’s ex-filtrated information. Serving decoys will confuse
an attacker into believing they have ex-filtrated useful information, when they have not.
This technology may be integrated with user behavior profiling technology to secure a
user’s data in the Cloud. .
Whenever abnormal and unauthorized access to a cloud service is noticed,
decoy information may be returned by the Cloud and delivered in such a way that it appear
completely normal and legitimate. The legitimate user, who is the owner of the
information, would readily identify when decoy information is being returned by the
Cloud, and hence could alter the Cloud’s responses through a variety of means, such as
challenge questions, to inform the Cloud security system that it has incorrectly detected an
unauthorized access. In the case where the access is correctly identified as an unauthorized
access, the Cloud security system would deliver unbounded amounts of bogus information
to the attacker, thus securing the user’s true data from can be implemented by given two
additional security features:
1. Validating whether data access is authorized when abnormal information access is detected
2. Confusing the attacker with bogus information that is by providing decoy documents.
We have applied above concepts to detect unauthorized data access to data stored on a
local file system by masqueraders, i.e. attackers who view of legitimate users after stealing
their credentials. Our experimental results in a local file system setting show that
combining both techniques can yield better detection results .This results suggest that this
approach may work in a Cloud environment, to make cloud system more transparent to the
user as a local file system.
1
Fog Computing VAISHNAVI METRE
Bringing data close to the user. Instead of housing information at data center sites
far from the end-point, the Fog aims to place the data close to the end-user.
Creating dense geographical distribution. First of all, big data and analytics can
be done faster with better results. Second, administrators are able to support
location- based mobility demands and not have to traverse the entire network.
Third, these edge (Fog) systems would be created in such a way that real-time data
analytics become a reality on a truly massive scale.
True support for mobility and the IoT. By controlling data at various edge points,
Fog computing integrates core cloud services with those of a truly distributed data
center platform. As more services are created to benefit the end-user, edge and Fog
networks will become more prevalent.
Numerous verticals are ready to adopt. Many organizations are already adopting
the concept of the Fog. Many different types of services aim to deliver rich content
to the end-user. This spans IT shops, vendors, and entertainment companies as
well.
Seamless integration with the cloud and other services. With Fog services, we’re able to
enhance the cloud experience by isolating user data that needs to live on the edge. From
there, administrators are able to tie-in analytics, security, or other services directly into
their cloud model.
A more complicated system — fog is an additional layer in the data processing and storage system.
Additional expenses — companies should buy edge devices: routers, hubs, gateways.
1
Fog Computing VAISHNAVI METRE
With the increase in data and cloud services utilization, Fog Computing will play a key
role in helping reduce latency and improving the user experience. We are now truly
distributing the data plane and pushing advanced services to the edge. By doing so,
administrators are able to bring rich content to the user faster, more efficiently, and – very
importantly – more economically. This, ultimately, will mean better data access, improved
corporate analytics capabilities, and an overall improvement in the end-user computing
experience
Cisco’s Ginny Nichols coined the term fog computing. The metaphor
comes from the fact that fog is the cloud close to the ground, just as fog computing
concentrates processing at the edge of the network. According to Cisco, fog computing
extends from the edge to the cloud, in a geographically distributed and hierarchical
organization.
“Fog could take a burden off the network. As 50 billion objects become
connected worldwide by 2020, it will not make sense to handle everything in the cloud.
Distributed apps and edge-computing devices need distributed resources. Fog brings
computation to the data. Low-power devices, close to the edge of the network, can deliver
real-time response”says Technical Leader Rodolfo Milito, one of Cisco’s thought leaders
in fog computing.
“The Internet of Everything is changing how we interact with the real
world,” Milito added:“Things that were totally disconnected from the Internet before, such
as cars, are now merging onto it. But as we go from one billion endpoints to one trillion
endpoints worldwide, that creates not only a real scalability problem but the challenge of
dealing with complex clusters of endpoints – what we call ‘rich systems’ – rather than
dealing with individual endpoints. Fog’s hardware infrastructure and software platform
helps solve that.”
1
Fog Computing VAISHNAVI METRE
CONCLUSION :-
Fog Computing platform has made some remarkable enhancements in various industries. With a
significant increase in IoT devices’ usage, there is a relevant increase in Fog Computing.
Fog Computing platform has also benefitted the retail sector by introducing innovative ways to deal with
real-time queries and issues. Stores may provide handheld devices to staff members to check product
information, check inventory, or even have self-checkout counters to improve customer experience.
Recently members from Cisco, Dell, Intel, Microsoft, ARM, and Princeton University founded OpenFog
Consortium in 2015. It aims to develop an open reference architecture that standardizes and promotes fog
computing across industries.
A recent report curated by GroundAlerts.com uncovers a few insights on the fog computing market,
detailed information on industry segmentation, and the aspects that will impact its profit scale.
1
Fog Computing VAISHNAVI METRE
REFERENCES
1. http://www.cisco.com/web/about/ac50/ac207/crc_new/university/RFP/rfp13078.html
2. http://www.howtogeek.com/185876/what-is-fog-computing/
3. http://newsroom.cisco.com/feature-content?type=webcontent&articleId=1365576
4. http://a4academics.com
5. https://en.wikipedia.org/wiki/Cloud_computing
6. https://en.wikipedia.org/wiki/Fog_computing