You are on page 1of 17

Fog Computing VAISHNAVI METRE

MCA20402 SEMINAR
Report On

Fog Computing
Submitted in partial fulfillment of requirement for the degree of

MASTER IN COMPUTER APPLICATION


(SANT GADGE BABA AMRAVATI UNIVERSITY, Amravati)

Submitted By

Vaishnavi P. Metre

Under the Guidance of


Prof. D. S. Deshmukh

P.G.Department of Computer Applications,

Prof. Ram Meghe Institute of Technology Research,


Badnera.

2022-2023

1
Fog Computing VAISHNAVI METRE

CERTIFICATE

This is to certify that the Seminar (MCA20402 ) titled


Fog Computing
Is a bonafide work and it is submitted to Sant Gadge Baba Amravati
University, Amravati
By

Vaishnavi Metre
in partial fulfillment of the requirement for the degree of

Master in Computer Application,

During the academic year 2022-2023 under the guidance of

Prof. D. S. Deshmukh Prof. R.R.Sherekar

Guide HOD

P.G. Department of Computer Applications,

Prof. Ram Meghe Institute of Technology Research,

Badnera.

2022-2023

2
Fog Computing VAISHNAVI METRE

ACKNOWLEDGEMENT

I feel deeply grateful to Prof. D. S. Deshmukh, my seminar Guide for his/her keen interest ,
positive guidance & suggestions during the preparation of this seminar. I also thank to Prof. R. R.
Sherekar , Head of P.G.Department of computer applications for helping & providing me all
the facilities during this seminar work.
I would also like to thank all faculty members & all friends for their support &
encouragement.
This is to acknowledge and express my thanks to all those who have directly or indirectly
helped me to complete my seminar successfully.

Submitted with Regards,

Vaishnavi P. Metre

Second Year MCA [Semester IV]

3
Fog Computing VAISHNAVI METRE

Index

Sr. No. Contents Page No.

1. Abstract 5

2. Introdution 6

3. Litrature Review 7

4. Architecture 9

5. Fog Computing Working Operation 10

6. Characteristics Of Fog Computing 10

7. Why Do We Need Fog Computing? 11

8. What Can We Do With Fog? 12

9. Security In Fog Computing 12

10. Decoy System: 13

11. Advantages And Disadvatages Of Fog Computing 14

12. Future Of Fog Computing 15

13. Conclusion 16

14. References 17

4
Fog Computing VAISHNAVI METRE

ABSTRACT:-

"Fog computing" means localizing at the edge of the network, some functions
and resources that techiques have developed over the years as cloud computing.
Simply it is removing cloud from network core to network edge. To understand Fog
computing let us try to understand cloud computing briefly.

Cloud computing is a combination of a number of computing strategies and concepts


such as Service Oriented Architecture (SOA), virtualization and others which reply on
the Internet. It also provides an easy way for accessing, managing and computation of
user data, but it also has its own severe security risks Very common risks now days
are data theft attacks.

To deal with such cases and malicious intruders there are some techniques which are
used to secure user data. A new technology called <Fog computing= is gaining
attention of the cloud users nowadays. Secondly, the pay-as-you-go" Cloud
computing model is an efficient alternative to owning and managing private data
centers (DCs) for customers facing Web applications and batch processing. It,
frees the enterprise and the end user from the specification of many details.
Analysts say that the future of much enterprise computing remains in the cloud, but
the real transformative computing of the future is going to happen right here, in
the objects that surround us4in the fog.

Fog Computing is not cannibalizing the cloud, rather it enables a new breed of
applications and services, there is a fruitful relationship between the Cloud and
the Fog, particularly when it comes to data management and analytics.

5
Fog Computing VAISHNAVI METRE

INTRODUCTION :-
Fog computing is the next generation computing which extends the cloud computing to the edge of the

network. It is also known as edge computing. It has been developed to address the issues faced by cloud

computing.

As we know volume of data generation is exploding due to huge amount of data generation daily by IoT

devices, Sensors, wide amount of internet usage and so on. It is estimated that about 50 billion devices will

be online by 2020. The current cloud model is not capable to handle this huge amount of data generated by

private companies, factories, airplanes, healthcare devices etc. Moreover data generated by IoT devices are

sent to clouds for analysis and storage. After the analysis, the data are sent back to the devices or are used

to perform certain action. This increases data bandwidth in the internet highway. Moreover certain time

sensitive data can not be handled by cloud network due to its higher latency.

The figure-1 depicts three layers viz. device, fog layer and cloud. As shown fog is intermediate layer

between cloud and devices which generate the data as shown. Fog computing extends the cloud to be

closer to the things which generate data. This minimizes latency requirement as fog nodes directly act on

the data. It processes and analyzes the data generated by IoT devices. Following are the major functions of

fog computing architecture.

• Analyzes most time sensitive data at the edge of the network, where they are generated by devices. This

avoids sending huge amount of data to the cloud.

• It acts on IoT data in milliseconds as per policy.

• Fog computing sends only selected data to the cloud for analysis and long term storage

6
Fog Computing VAISHNAVI METRE

LITRATURE REVIEW:-
Several works related to our work, which presents the concepts of fog computing are explained below:

Pearson, Siani, et al. (2010)


wrote a paper.In this paper authors described that “cloud computing is an emerging paradigm for large scale
infrastructures. It has the advantage of reducing cost by sharing computing and storage resources,
combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These
new features have a direct impact on the budgeting of IT budgeting but also affect traditional security, trust
and privacy mechanisms. Many of these mechanisms are no longer adequate, but need to be rethought to
fit this new paradigm. In this paper they assessed how security, trust and privacy issues occur in the
context of cloud computing and discuss ways in which they may be addressed”.

Dlamini, M. T. et al. (2011)


wrote a paper.In this paper authors described that “cloud computing is a new computing paradigm for the
provisioning, delivery and consumption of IT resources and services on the Internet. This computing
paradigm comes with huge benefits such as cost savings, increased resilience and service availability,
improved IT operations efficiency and flexibility. However, most research cites security concerns as one of
the biggest challenges for most of these organizations. This has led to fallacy or misconception about
security challenges of the „cloud‟ which needs to be clarified. This is a call for more research to separate
reality from the hype. Hence, this paper aims to separate justified security concerns from the hype, fear of
the unknown and confusion that currently prevails within cloud computing. This paper aims to advance the
current discussions on cloud computing security in order to clear the „foggy cloud‟ hovering over such a
promising technology development. It seeks to inform and make decision makers aware of the real
pertinent and justified security issues within cloud computing”

Stolfo, Salvatore J., et al. (2012)


described in their paper that “cloud computing promises to significantly change the way we use computers
and access and store our personal and business information. With these new computing and
communications paradigms arise new data security challenges. Existing data protection mechanisms such
as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the
cloud provider. They proposed a different approach for securing data in the cloud using offensive decoy
technology. They monitored data access in the cloud and detect abnormal data access patterns. When
unauthorized access is suspected and then verified using challenge questions, we launch a disinformation
attack by returning large amounts of decoy information to the attacker. This protects against the misuse of
the user's real data. Experiments conducted in a local file setting provide evidence that this approach may
provide unprecedented levels of user data security in a Cloud environment”

Hong, Kirak et al. (2013)


in their paper described that “the ubiquitous deployment of mobile and sensor devices is creating a new
environment, namely the Internet of Things (IoT), that enables a wide range of future Internet applications.
In this work, they presented Mobile Fog, a high level programming model for the future Internet
applications that are geospatially distributed, large-scale, and latency-sensitive. They analyzed use cases
for the programming model with camera network and connected vehicle applications to show the efficacy
of Mobile Fog. They also evaluated application performance through simulation”

7
Fog Computing VAISHNAVI METRE

Firdhous, Mohamed et al. (2014)


described that “cloud computing is the newest computing paradigm that makes computing resources
available over the Internet on a utility costing basis. Cloud computing offers many advantages to users in
terms of reduced cost, elimination of system administrative functions, increased flexibility, better
reliability and location independence. Though these are definite advantages, cloud computing also suffers
from certain limitations. These limitations arise from the very same reason that is considered an advantage
too. Hosting of cloud data centres in the Internet creates large and unpredictable network latencies and
undefined security issues as sensitive data is now entrusted to a third party. Also location independence of
processing in cloud computing may also not desirable for certain types of networks such as sensor
networks and Internet of Things. These services are known as location aware services and require location
dependent fast processing. In order to overcome these limitations, researchers have proposed a new cloud
computing model called fog computing where the cloud system is located either at the edge of the private
network or very close to it.”

Bitam, Salim et al. (2015)


described that “cloud computing is a network access model that aims to transparently and ubiquitously
share a large number of computing resources. These are leased by a service provider to digital customers,
usually through the Internet. Due to the increasing number of traffic accidents and dissatisfaction of road
users in vehicular networks, the major focus of current solutions provided by intelligent transportation
systems is on improving road safety and ensuring passenger comfort. Various transportation services
provided by VANET-Cloud are reviewed, and some future research directions are highlighted, including
security and privacy, data aggregation, energy efficiency, interoperability, and resource management”.

Roman, Rodrigo et al. (2016)


described that “cloud computing paradigm is unable to meet certain requirements (e.g. low latency and
jitter, context awareness, mobility support) that are crucial for several applications (e.g. vehicular
networks, augmented reality). To fulfill these requirements, various paradigms, such as fog computing,
mobile edge computing, and mobile cloud computing, have emerged in recent years. While these edge
paradigms share several features, most of the existing research is compartmentalized; no synergies have
been explored. This is especially true in the field of security, where most analyses focus only on one edge
paradigm, while ignoring the others. The main goal of this study is to holistically analyze the security
threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies
and venues of collaboration. In our results, we will show that all edge paradigms should consider the
advances in other paradigms”.

HISTORY :-

The term fog computing was coined by Cisco in January 2014. This was because fog is referred to as
clouds that are close to the ground in the same way fog computing was related to the nodes which are
present near the nodes somewhere in between the host and the cloud. It was intended to bring the
computational capabilities of the system close to the host machine. After this gained a little popularity,
IBM, in 2015, coined a similar term called “Edge Computing”.

8
Fog Computing VAISHNAVI METRE

ARCHITECTURE :-

The Fog computing architecture consists of physical and logical elements in the form of hardware and
software to implement IoT (Internet of Things) network. As shown in figure-2, it is composed of IoT
devices, fog nodes, fog aggregation nodes with the help of fog data services, remote cloud storage and
local data storage server/cloud. Let us understand fog computing architecture components

Fig: Fog Computing Architecture

• IoT devices: These are devices connected on IoT network using various wired and wireless technologies.
These devices produce data regularly in huge amount. There are numerous wireless technologies used in
IoT which include Zigbee, Zwave, RFID, 6LoWPAN, HART, NFC, Bluetooth, BLE, NFC, ISA-100.11A
etc. IoT protocols used include IPv4, IPv6, MQTT, CoAP, XMPP, AMQP etc.
• Fog Nodes: Any device with computing, storage and network connectivity is known as fog node.
Multiple fog nodes are spread across larger region to provide support to end devices. Fog nodes are
connected using different topologies. The fog nodes are installed at various locations as per different
applications such as on floor of a factory, on top of power pole, along side of railway track, in vehicles,
on oil rig and so on. Examples of fog nodes are switches, embedded servers, controllers, routers, cameras
etc. High sensitive data are processed at these fog nodes.
• Fog aggregate nodes: Each fog nodes have their aggregate fog node. It analyzes data in seconds to
minutes. IoT data storage at these nodes can be of duration in hours or days. Its geographical coverage is
wider. Fog data services are implemented to implement such aggregate node points. They are used to
address average sensitive data

9
Fog Computing VAISHNAVI METRE

FOG COMPUTING WORKING OPERATION :-

As we know there are three types of data viz. most time sensitive data, less time sensitive data and time-
insensitive data. Fog computing architecture works based on type of data it receives. Nearest fog nodes
takes data input from the devices. Let us understand working of fog computing architecture.

➨Most time sensitive data are handled by nearest fog node to end device which has generated the data.
After the received data is analyzed, decision or action is transmitted to the device. After this, fog node
sends and stores summary to the cloud for future analysis. The data at fog node is analyzed in fraction of
a second.
➨Less time sensitive data are sent to aggregate node for analysis. After analysis is performed, aggregate
node sends decision or action to the device through nearest node. Aggregate fog node takes seconds or
minutes to complete the analysis. The aggregate node later sends the report to cloud for future analysis
purpose.
➨The time insensitive data can wait for longer duration (in hours, days or weeks). The data is sent to
cloud for storage and future analysis.

CHARACTERISTICS OF FOG COMPUTING :-

 Proximity to end-users, its


 Dense geographical distribution
 Support for mobility.

Fog reduces service latency, and improves QoS (Quality of Service), resulting in superior user-
experience. Fog Computing supports emerging Internet of Everything (IoE) applications that demand real-
time/predictable latency (industrial automation, transportation, networks of sensors and actuators). Fog
paradigm is well positioned for real time Big Data and real time analytics, it supports densely distributed
data collection points, hence adding a fourth axis to the often mentioned Big Data dimensions (volume,
variety, and velocity).
Unlike traditional data centers, Fog devices are geographically distributed over heterogeneous
platforms, spanning multiple management domains. That means data can be processed locally in smart
devices rather than being sent to the cloud for processing

1
Fog Computing VAISHNAVI METRE

WHY DO WE NEED FOG COMPUTING?

In the past few years, Cloud computing has provided many opportunities for
enterprises by offering their customers a range of computing services. Current “pay-as-
you- go” Cloud computing model becomes an efficient alternative to owning and
managing private data centers for customers facing Web applications and batch processing
Cloud computing frees the enterprises and their end users from the specification of many
details, such as storage resources, computation limitation and network communication
cost.
However, this bliss becomes a problem for latency-sensitive applications, which
require nodes in the vicinity to meet their delay requirements. When techniques and
devices of IoT are getting more involved in people’s life, current Cloud computing
paradigm can hardly satisfy their requirements of mobility support, location awareness and
low latency.
Fog computing is proposed to address the above problem. As Fog computing is
implemented at the edge of the network, it provides low latency, location awareness, and
improves quality-of-services (QoS) for streaming and real time applications. Typical
examples include industrial automation, transportation, and networks of sensors and
actuators. Moreover, this new infrastructure supports heterogeneity as Fog devices include
end-user devices, access points, edge routers and switches. The Fog paradigm is well
positioned for real time big data analytics, supports densely distributed data collection
points, and provides advantages in entertainment, advertising, personal computing and
other applications.

WHAT CAN WE DO WITH FOG?

We elaborate on the role of Fog computing in the following motivating scenarios. The
advantages of Fog computing satisfy the requirements of applications in these scenarios.

Smart Traffic Lights and Connected Vehicles:


Video camera that senses an ambulance flashing lights can
automatically change street lights to open lanes for the vehicle to pass through traffic.
Smart street lights interact locally with sensors and detect presence of pedestrian and
bikers, and measure the distance and speed of approaching vehicles. Intelligent lighting
turns on once a sensor identifies movement and switches off as traffic passes. Neighboring
smart lights serving as Fog devices coordinate to create green traffic wave and send
warning signals to approaching vehicles. Wireless access points like Wi-Fi, 3G, road-side
units and smart traffic lights are deployed along the roads. Vehicles-to Vehicle, vehicle to
access points, and access points to access points interactions enrich the application of this
scenario.
Wireless Sensor and Actuator Networks:
Traditional wireless sensor networks fall short in applications that go
beyond sensing and tracking, but require actuators to exert physical actions like opening,
closing or even carrying sensors. In this scenario, actuators serving as Fog devices can
control the measurement process itself, the stability and the oscillatory behaviours by
creating a closed-loop system. For example, in the scenario of self-maintaining trains,
sensor monitoring on a train’s ball-bearing can detect heat levels, allowing applications to
send an automatic alert to the train operator to stop the train at next station for emergency
maintenance and avoid potential derailment. In lifesaving air vents scenario, sensors on
vents monitor air conditions flowing in and out of mines and automatically change air-flow
if conditions become dangerous to miners

1
Fog Computing VAISHNAVI METRE

Iot And Cyber-Physical Systems (Cpss):


Fog computing based systems are becoming an important class of IoT and
CPSs. Based on the traditional information carriers including Internet and
telecommunication network, IoT is a network that can interconnect ordinary physical
objects with identified address. CPSs feature a tight combination of the system’s
computational and physical elements. CPSs also coordinate the integration of computer
and information centric physical and engineered systems.
IoT and CPSs promise to transform our world with new relationships
between computer-based control and communication systems, engineered systems and
physical reality. Fog computing in this scenario is built on the concepts of embedded
systems in which software programs and computers are embedded in devices for reasons
other than computation alone. Examples of the devices include toys, cars, medical devices
and machinery. The goal is to integrate the abstractions and precision of software and
networking with the dynamics, uncertainty and noise in the physical environment. Using
the emerging knowledge, principles and methods of CPSs, we will be able to develop new
generations of intelligent medical devices and systems, ‘smart’ highways, buildings,
factories, agricultural and robotic systems.

SECURITY IN FOG COMPUTING:

There are various ways to use cloud services to save or store files,
documents and media in remote services that can be accessed whenever user connect to the
Internet. The main problem in cloud is to maintain security for user’s data in way that
guarantees only authenticated users and no one else gain access to that data. The issue of
providing security to confidential information is core security problem, that it does not
provide level of assurance most people desire. There are various methods to secure remote
data in cloud using standard access control and encryption methods.
It is good to say that all the standard approaches used for providing
security have been demonstrated to fail from time to time for a variety of reasons,
including faulty implementations, buggy code, insider attacks, misconfigured services, and
the creative construction of effective and sophisticated attacks not envisioned by the
implementers of security procedures. Building a secure and trustworthy cloud computing
environment is not enough, because attacks on data continue to happen, and when they do,
and information gets lost, there is no way to get it back. There is a need to get solutions to
such accidents.
The basic idea is that we can limit the damage of stolen data if we decrease the
value of that stolen data to the attacker. We can achieve this through a „preventive‟ decoy
(disinformation) attack. We can secure Cloud services by implementing given additional
security features.

1
Fog Computing VAISHNAVI METRE

DECOY SYSTEM:
Decoy data, such as decoy documents, honey pots and other bogus
information can be generated on demand and used for detecting unauthorized access to
information and to poison the thief’s ex-filtrated information. Serving decoys will confuse
an attacker into believing they have ex-filtrated useful information, when they have not.
This technology may be integrated with user behavior profiling technology to secure a
user’s data in the Cloud. .
Whenever abnormal and unauthorized access to a cloud service is noticed,
decoy information may be returned by the Cloud and delivered in such a way that it appear
completely normal and legitimate. The legitimate user, who is the owner of the
information, would readily identify when decoy information is being returned by the
Cloud, and hence could alter the Cloud’s responses through a variety of means, such as
challenge questions, to inform the Cloud security system that it has incorrectly detected an
unauthorized access. In the case where the access is correctly identified as an unauthorized
access, the Cloud security system would deliver unbounded amounts of bogus information
to the attacker, thus securing the user’s true data from can be implemented by given two
additional security features:

1. Validating whether data access is authorized when abnormal information access is detected
2. Confusing the attacker with bogus information that is by providing decoy documents.

We have applied above concepts to detect unauthorized data access to data stored on a
local file system by masqueraders, i.e. attackers who view of legitimate users after stealing
their credentials. Our experimental results in a local file system setting show that
combining both techniques can yield better detection results .This results suggest that this
approach may work in a Cloud environment, to make cloud system more transparent to the
user as a local file system.

1
Fog Computing VAISHNAVI METRE

ADVANTAGES OF FOG COMPUTING

 Bringing data close to the user. Instead of housing information at data center sites
far from the end-point, the Fog aims to place the data close to the end-user.

 Creating dense geographical distribution. First of all, big data and analytics can
be done faster with better results. Second, administrators are able to support
location- based mobility demands and not have to traverse the entire network.
Third, these edge (Fog) systems would be created in such a way that real-time data
analytics become a reality on a truly massive scale.

 True support for mobility and the IoT. By controlling data at various edge points,
Fog computing integrates core cloud services with those of a truly distributed data
center platform. As more services are created to benefit the end-user, edge and Fog
networks will become more prevalent.

 Numerous verticals are ready to adopt. Many organizations are already adopting
the concept of the Fog. Many different types of services aim to deliver rich content
to the end-user. This spans IT shops, vendors, and entertainment companies as
well.

 Seamless integration with the cloud and other services. With Fog services, we’re able to
enhance the cloud experience by isolating user data that needs to live on the edge. From
there, administrators are able to tie-in analytics, security, or other services directly into
their cloud model.

DISADVANTAGES OF FOG COMPUTING :-

 A more complicated system — fog is an additional layer in the data processing and storage system.

 Additional expenses — companies should buy edge devices: routers, hubs, gateways.

 Limited scalability — fog is not as scalable as the cloud.

1
Fog Computing VAISHNAVI METRE

FUTURE OF FOG COMPUTING

With the increase in data and cloud services utilization, Fog Computing will play a key
role in helping reduce latency and improving the user experience. We are now truly
distributing the data plane and pushing advanced services to the edge. By doing so,
administrators are able to bring rich content to the user faster, more efficiently, and – very
importantly – more economically. This, ultimately, will mean better data access, improved
corporate analytics capabilities, and an overall improvement in the end-user computing
experience
Cisco’s Ginny Nichols coined the term fog computing. The metaphor
comes from the fact that fog is the cloud close to the ground, just as fog computing
concentrates processing at the edge of the network. According to Cisco, fog computing
extends from the edge to the cloud, in a geographically distributed and hierarchical
organization.
“Fog could take a burden off the network. As 50 billion objects become
connected worldwide by 2020, it will not make sense to handle everything in the cloud.
Distributed apps and edge-computing devices need distributed resources. Fog brings
computation to the data. Low-power devices, close to the edge of the network, can deliver
real-time response”says Technical Leader Rodolfo Milito, one of Cisco’s thought leaders
in fog computing.
“The Internet of Everything is changing how we interact with the real
world,” Milito added:“Things that were totally disconnected from the Internet before, such
as cars, are now merging onto it. But as we go from one billion endpoints to one trillion
endpoints worldwide, that creates not only a real scalability problem but the challenge of
dealing with complex clusters of endpoints – what we call ‘rich systems’ – rather than
dealing with individual endpoints. Fog’s hardware infrastructure and software platform
helps solve that.”

1
Fog Computing VAISHNAVI METRE

CONCLUSION :-

Fog Computing platform has made some remarkable enhancements in various industries. With a
significant increase in IoT devices’ usage, there is a relevant increase in Fog Computing.

Fog Computing platform has also benefitted the retail sector by introducing innovative ways to deal with
real-time queries and issues. Stores may provide handheld devices to staff members to check product
information, check inventory, or even have self-checkout counters to improve customer experience.

Recently members from Cisco, Dell, Intel, Microsoft, ARM, and Princeton University founded OpenFog
Consortium in 2015. It aims to develop an open reference architecture that standardizes and promotes fog
computing across industries.

A recent report curated by GroundAlerts.com uncovers a few insights on the fog computing market,
detailed information on industry segmentation, and the aspects that will impact its profit scale.

1
Fog Computing VAISHNAVI METRE

REFERENCES

1. http://www.cisco.com/web/about/ac50/ac207/crc_new/university/RFP/rfp13078.html

2. http://www.howtogeek.com/185876/what-is-fog-computing/

3. http://newsroom.cisco.com/feature-content?type=webcontent&articleId=1365576

4. http://a4academics.com

5. https://en.wikipedia.org/wiki/Cloud_computing

6. https://en.wikipedia.org/wiki/Fog_computing

You might also like